Sciweavers

4513 search results - page 845 / 903
» Modeling with a Sense of Purpose
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
PET
2004
Springer
15 years 3 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to flow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
VLDB
2004
ACM
100views Database» more  VLDB 2004»
15 years 3 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
WAW
2004
Springer
150views Algorithms» more  WAW 2004»
15 years 3 months ago
Do Your Worst to Make the Best: Paradoxical Effects in PageRank Incremental Computations
d Abstract) Paolo Boldi† Massimo Santini‡ Sebastiano Vigna∗ Deciding which kind of visit accumulates high-quality pages more quickly is one of the most often debated issue i...
Paolo Boldi, Massimo Santini, Sebastiano Vigna
CSB
2003
IEEE
106views Bioinformatics» more  CSB 2003»
15 years 3 months ago
Reconstruction of Ancestral Gene Order after Segmental Duplication and Gene Loss
As gene order evolves through a variety of chromosomal rearrangements, conserved segments provide important insight into evolutionary relationships and functional roles of genes. ...
Jun Huan, Jan Prins, Wei Wang 0010, Todd J. Vision