Sciweavers

519 search results - page 45 / 104
» How to make secure email easier to use
Sort
View
ECIS
2003
14 years 11 months ago
An empirical investigation of intelligent agents for e-business customer relationship management: a knowledge management perspec
: Using a knowledge management perspective, this paper investigates new and efficient ways of applying intelligent agents to e-business customer relationship management. Intelligen...
Weiquan Wang, Izak Benbasat
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
15 years 10 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
CSFW
2003
IEEE
15 years 3 months ago
Identity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols using the Weil or Tate pairings. These issues include how to make protocols effici...
Liqun Chen, Caroline Kudla
ICML
2007
IEEE
15 years 10 months ago
Self-taught learning: transfer learning from unlabeled data
We present a new machine learning framework called "self-taught learning" for using unlabeled data in supervised classification tasks. We do not assume that the unlabele...
Rajat Raina, Alexis Battle, Honglak Lee, Benjamin ...
SIAMCOMP
2011
14 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...