Sciweavers

7623 search results - page 155 / 1525
» Constructive Volume Modeling
Sort
View
117
Voted
CCS
2007
ACM
15 years 9 months ago
New constructions of fuzzy identity-based encryption
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracle model. Not only do our schemes provide public parameters whose size is indepe...
Joonsang Baek, Willy Susilo, Jianying Zhou
150
Voted
DCC
1992
IEEE
15 years 7 months ago
Constructing Word-Based Text Compression Algorithms
Text compression algorithms are normally defined in terms of a source alphabet of 8-bit ASCII codes. We consider choosing to be an alphabet whose symbols are the words of Englis...
R. Nigel Horspool, Gordon V. Cormack
SNPD
2007
15 years 4 months ago
Localized Flooding Backbone Construction for Location Privacy in Sensor Networks
Source and destination location privacy is a challenging and important problem in sensor networks. Nevertheless, privacy preserving communication in sensor networks is still a vir...
Yingchang Xiang, Dechang Chen, Xiuzhen Cheng, Kai ...
EMNLP
2006
15 years 4 months ago
Automatic Construction of Predicate-argument Structure Patterns for Biomedical Information Extraction
This paper presents a method of automatically constructing information extraction patterns on predicate-argument structures (PASs) obtained by full parsing from a smaller training...
Akane Yakushiji, Yusuke Miyao, Tomoko Ohta, Yuka T...
ICISC
2003
117views Cryptology» more  ICISC 2003»
15 years 4 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz