Sciweavers

234 search results - page 20 / 47
» Text Search Protocols with Simulation Based Security
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 3 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
JSW
2008
127views more  JSW 2008»
14 years 9 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
WSDM
2010
ACM
203views Data Mining» more  WSDM 2010»
15 years 7 months ago
Query Reformulation Using Anchor Text
Query reformulation techniques based on query logs have been studied as a method of capturing user intent and improving retrieval effectiveness. The evaluation of these techniques...
Van Dang, Bruce W. Croft
AGENTS
1997
Springer
15 years 1 months ago
SAIRE - A Scalable Agent-Based Information Retrieval Engine
The information access and retrieval capabilities provided by several conventional search engines, while improving upon traditional techniques, are lacking in supporting conceptua...
Jidé B. Odubiyi, David J. Kocur, Stuart M. ...
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
13 years 2 days ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy