Sciweavers

1186 search results - page 66 / 238
» A New Approach to Secure Logging
Sort
View
121
Voted
CVPR
2008
IEEE
16 years 5 months ago
Semi-supervised distance metric learning for Collaborative Image Retrieval
Typical content-based image retrieval (CBIR) solutions with regular Euclidean metric usually cannot achieve satisfactory performance due to the semantic gap challenge. Hence, rele...
Steven C. H. Hoi, Wei Liu, Shih-Fu Chang
PLDI
2006
ACM
15 years 9 months ago
Optimizing memory transactions
Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement...
Timothy L. Harris, Mark Plesko, Avraham Shinnar, D...
EUROCRYPT
1998
Springer
15 years 8 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval
ADHOC
2008
146views more  ADHOC 2008»
15 years 3 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
142
Voted
CCS
2007
ACM
15 years 10 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...