Sciweavers

14824 search results - page 2660 / 2965
» Security - Introduction
Sort
View
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 7 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 7 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
AINA
2004
IEEE
15 years 7 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 7 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
AIMSA
2006
Springer
15 years 7 months ago
N-Gram Feature Selection for Authorship Identification
Automatic authorship identification offers a valuable tool for supporting crime investigation and security. It can be seen as a multi-class, single-label text categorization task. ...
John Houvardas, Efstathios Stamatatos
« Prev « First page 2660 / 2965 Last » Next »