Sciweavers

72 search results - page 8 / 15
» Reply to Rao et al. and Lee et al
Sort
View
CN
2007
97views more  CN 2007»
14 years 9 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
ICWSM
2010
14 years 8 months ago
Coping With Noise in a Real-World Weblog Crawler and Retrieval System
In this paper we examine the effects of noise when creating a real-world weblog corpus for information retrieval. We focus on the DiffPost (Lee et al. 2008) approach to noise remo...
James Lanagan, Paul Ferguson, Neil O'Hare, Alan F....
ICALP
2007
Springer
15 years 3 months ago
Succinct Ordinal Trees Based on Tree Covering
Abstract. Various methods have been used to represent a tree on n nodes in essentially the informationtheoretic minimum space while supporting various navigational operations in co...
Meng He, J. Ian Munro, S. Srinivasa Rao
CCE
2011
14 years 4 months ago
Process intensification in duplex pressure swing adsorption
As an alternative to the pressure swing adsorption (PSA) based on the Skarstrom cycle or its variants, a novel two-bed PSA--called duplex PSA--has been proposed by Hirose and inde...
R. S. Thakur, Nitin Kaistha, D. P. Rao
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim