Sciweavers

503 search results - page 6 / 101
» An Independence Relation for Sets of Secrets
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 9 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 2 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
IMCSIT
2010
13 years 6 months ago
Learning taxonomic relations from a set of text documents
This paper presents a methodology for learning taxonomic relations from a set of documents that each explain one of the concepts. Three different feature extraction approaches with...
Mari-Sanna Paukkeri, Alberto Pérez Garc&iac...
CCCG
2010
13 years 10 months ago
Constrained k-center and movement to independence
We obtain hardness results and approximation algorithms for two related geometric problems involving movement. The first is a constrained variant of the k-center problem, arising ...
Adrian Dumitrescu, Minghui Jiang
VLDB
1987
ACM
86views Database» more  VLDB 1987»
13 years 12 months ago
Independent Database Schemes under Functional and Inclusion Dependencies
In a context considering in a unique framework all the relations in a database, by means of the notion of global consistency, independent database schemes allow enforcement of con...
Paolo Atzeni, Edward P. F. Chan