Sciweavers

2372 search results - page 131 / 475
» Probabilistic calling context
Sort
View
112
Voted
ACSAC
2009
IEEE
15 years 10 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
123
Voted
APN
2005
Springer
15 years 9 months ago
The (True) Concurrent Markov Property and Some Applications to Markov Nets
Abstract. We study probabilistic safe Petri nets, a probabilistic extension of safe Petri nets interpreted under the true-concurrent semantics. In particular, the likelihood of pro...
Samy Abbes
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
15 years 8 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
15 years 7 months ago
The topic-perspective model for social tagging systems
In this paper, we propose a new probabilistic generative model, called Topic-Perspective Model, for simulating the generation process of social annotations. Different from other g...
Caimei Lu, Xiaohua Hu, Xin Chen, Jung-ran Park, Ti...
122
Voted
CSB
2004
IEEE
15 years 7 months ago
MISAE: A New Approach for Regulatory Motif Extraction
The recognition of regulatory motifs of co-regulated genes is essential for understanding the regulatory mechanisms. However, the automatic extraction of regulatory motifs from a ...
Zhaohui Sun, Jingyi Yang, Jitender S. Deogun