Sciweavers

9405 search results - page 1852 / 1881
» Computing a Model of Set Theory
Sort
View
EUROCRYPT
2009
Springer
16 years 11 days ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 10 days ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 10 days ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
101
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 10 days ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
16 years 6 days ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
« Prev « First page 1852 / 1881 Last » Next »