Sciweavers

247 search results - page 16 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
ICDM
2007
IEEE
136views Data Mining» more  ICDM 2007»
14 years 1 months ago
Dynamic Micro Targeting: Fitness-Based Approach to Predicting Individual Preferences
It is crucial to segment customers intelligently in order to offer more targeted and personalized products and services. Traditionally, customer segmentation is achieved using sta...
Tianyi Jiang, Alexander Tuzhilin
IEAAIE
2010
Springer
13 years 5 months ago
Hierarchical Topic-Based Communities Construction for Authors in a Literature Database
In this paper, given a set of research papers with only title and author information, a mining strategy is proposed to discover and organize the communities of authors according to...
Chien-Liang Wu, Jia-Ling Koh
CCGRID
2005
IEEE
14 years 1 months ago
Secret sequence comparison on public grid computing resources
Once a new gene has been sequenced, it must be verified whether or not it is similar to previously sequenced genes. In many cases, the organization that sequenced a potentially n...
Ken-ichi Kurata, Hiroshi Nakamura, Vincent Breton
CHES
2005
Springer
107views Cryptology» more  CHES 2005»
14 years 27 days ago
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
We describe a new variant of the well known Baby-Step Giant-Step algorithm in the case of some discrete logarithms with a special structure. More precisely, we focus on discrete lo...
Jean-Sébastien Coron, David Lefranc, Guilla...
ISW
2010
Springer
13 years 5 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish