Sciweavers

178 search results - page 21 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
ICML
1997
IEEE
16 years 18 days ago
A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization
The Rocchio relevance feedback algorithm is one of the most popular and widely applied learning methods from information retrieval. Here, a probabilistic analysis of this algorith...
Thorsten Joachims
EUROPKI
2009
Springer
14 years 9 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
BIOID
2008
149views Biometrics» more  BIOID 2008»
15 years 1 months ago
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Abstract. To implement a biometric authentication scheme, the templates of a group of people are stored in the database (DB) under the names of these people. Some person presents a...
Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J....
TMC
2010
111views more  TMC 2010»
14 years 10 months ago
Interference Management and Rate Adaptation in OFDM-Based UWB Networks
—Ultra-wideband (UWB) communications has emerged as a promising technology for high data rate wireless personal area networks (WPANs). Several proposals for UWB-based WPANs have ...
Raed T. Al-Zubi, Marwan Krunz