Sciweavers

470 search results - page 31 / 94
» An adaptive probabilistic trust model and its evaluation
Sort
View
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
14 years 26 days ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
CLEF
2009
Springer
13 years 9 months ago
A Rule-Based Acquisition Model Adapted for Morphological Analysis
We adapt the cognitively-oriented morphology acquisition model proposed in (Chan 2008) to perform morphological analysis, extending its concept of base-derived relationships to all...
Constantine Lignos, Erwin Chan, Mitchell P. Marcus...
ITS
2004
Springer
94views Multimedia» more  ITS 2004»
14 years 2 months ago
A Model for Student Knowledge Diagnosis Through Adaptive Testing
This work presents a model for student knowledge diagnosis that can be used in ITSs for student model update. The diagnosis is accomplished through Computerized Adaptive Testing (C...
Eduardo Guzmán, Ricardo Conejo
ATAL
2009
Springer
14 years 1 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...
IACR
2011
137views more  IACR 2011»
12 years 8 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...