Sciweavers

1573 search results - page 143 / 315
» Strong User Authentication
Sort
View
135
Voted
IACR
2011
105views more  IACR 2011»
14 years 1 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
146
Voted
PAMI
2012
13 years 4 months ago
Rhythmic Brushstrokes Distinguish van Gogh from His Contemporaries: Findings via Automated Brushstroke Extraction
— Art historians have long observed the highly characteristic brushstroke styles of Vincent van Gogh and have relied on discerning these styles for authenticating and dating his ...
Jia Li, Lei Yao, Ella Hendriks, James Z. Wang
INFOCOM
2006
IEEE
15 years 8 months ago
"Take One Get One Free": Leveraging P2P Networks for Content Promotion
— The nature of digital content is undergoing a radical transformation due to the growing infusion of user-generated content. Users that generate content have a strong motivation...
Himabindu Pucha, Sabyasachi Roy, Y. Charlie Hu
124
Voted
EEE
2005
IEEE
15 years 7 months ago
Personalization Techniques for Web Search Results Categorization
Generic web search is designed to serve all users, independent of the individual needs and without any adaptation to personal requirements. We propose a novel technique1 that perf...
John D. Garofalakis, Theofanis Matsoukas, Yannis P...
FC
2006
Springer
96views Cryptology» more  FC 2006»
15 years 5 months ago
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
In many content distribution systems it is important both to restrict access to content to authorized users and to protect the identities of these users. We discover that current s...
Adam Barth, Dan Boneh, Brent Waters