Sciweavers

8972 search results - page 86 / 1795
» Private Information Retrieval
Sort
View
MM
1997
ACM
133views Multimedia» more  MM 1997»
15 years 3 months ago
Supporting Similarity Queries in MARS
To address the emerging needs of applications that require access to and retrieval of multimediaobjects, we are developing the Multimedia Analysis and Retrieval System (MARS) in o...
Michael Ortega, Yong Rui, Kaushik Chakrabarti, Sha...
IJFCS
2007
93views more  IJFCS 2007»
14 years 11 months ago
Modelling and Analysis of PKI-Based Systems Using Process Calculi
In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retriev...
Benjamin Aziz, Geoff Hamilton
PERCOM
2007
ACM
15 years 10 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
EUROPKI
2004
Springer
15 years 4 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 2 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith