Sciweavers

129 search results - page 14 / 26
» Symmetrically Private Information Retrieval
Sort
View
112
Voted
ICMCS
2009
IEEE
205views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Bregman vantage point trees for efficient nearest Neighbor Queries
Nearest Neighbor (NN) retrieval is a crucial tool of many computer vision tasks. Since the brute-force naive search is too time consuming for most applications, several tailored d...
Frank Nielsen, Paolo Piro, Michel Barlaud
IH
2005
Springer
15 years 6 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
88
Voted
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 6 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
WWW
2007
ACM
16 years 1 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
94
Voted
DGO
2008
114views Education» more  DGO 2008»
15 years 1 months ago
Towards a business continuity information network for rapid disaster recovery
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities such as the terrorist attacks of September 11th 20...
Khalid Saleem, Steven Luis, Yi Deng, Shu-Ching Che...