Sciweavers

2478 search results - page 148 / 496
» Message from the Chair
Sort
View
136
Voted
ICALP
2007
Springer
15 years 10 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
120
Voted
IWSEC
2007
Springer
15 years 10 months ago
How to Find Many Collisions of 3-Pass HAVAL
The hash function HAVAL is an Australian extension of well known Merkle-Damg˚ard hash functions such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVA...
Kazuhiro Suzuki, Kaoru Kurosawa
INFOCOM
2006
IEEE
15 years 10 months ago
A Fast Content-Based Data Distribution Infrastructure
— We present Sieve – an infrastructure for fast content-based data distribution to interested users. The ability of Sieve to filter and forward high-bandwidth data streams ste...
Samrat Ganguly, Sudeept Bhatnagar, Akhilesh Saxena...
IEEECIT
2005
IEEE
15 years 10 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
WETICE
2005
IEEE
15 years 10 months ago
CAFE - Collaborative Agents for Filtering E-mails
CAFE (Collaborative Agents for Filtering E-mails) is a multi-agent system to collaboratively filter spam from users’ mail stream. CAFE associates a proxy agent with each user, a...
Lorenzo Lazzari, Marco Mari, Agostino Poggi