Sciweavers

1573 search results - page 268 / 315
» Strong User Authentication
Sort
View
CCS
2007
ACM
15 years 4 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
EUROCRYPT
2007
Springer
15 years 4 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
ICWE
2007
Springer
15 years 4 months ago
Model-driven Construction of Workflow-based Web Applications with Domain-specific Languages
The requirements for Web applications concerning workflow execution, interaction, aesthetics, federation and Web service integration are steadily increasing. Considering their comp...
Patrick Freudenstein, Jan Buck, Martin Nussbaumer,...
NLDB
2007
Springer
15 years 3 months ago
Incomplete and Fuzzy Conceptual Graphs to Automatically Index Medical Reports
Most of Information Retrieval (IR) systems are still based on bag of word paradigm. This is a strong limitation if one needs high precision answers. For example, in restricted doma...
Loïc Maisonnasse, Jean-Pierre Chevallet, Cath...
WINE
2007
Springer
151views Economy» more  WINE 2007»
15 years 3 months ago
Computing Optimal Bundles for Sponsored Search
A context in sponsored search is additional information about a query, such as the user’s age, gender or location, that can change an advertisement’s relevance or an advertise...
Arpita Ghosh, Hamid Nazerzadeh, Mukund Sundararaja...