Sciweavers

2421 search results - page 38 / 485
» Message from the Co-Chairs
Sort
View
NAACL
2010
13 years 5 months ago
Automatic Generation of Personalized Annotation Tags for Twitter Users
This paper introduces a system designed for automatically generating personalized annotation tags to label Twitter user's interests and concerns. We applied TFIDF ranking and...
Wei Wu, Bin Zhang, Mari Ostendorf
JCST
2007
98views more  JCST 2007»
13 years 7 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
IACR
2011
115views more  IACR 2011»
12 years 7 months ago
Threshold Encryption into Multiple Ciphertexts
We propose (T, N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption ...
Martin Stanek
OPODIS
2007
13 years 9 months ago
From an Intermittent Rotating Star to a Leader
Considering an asynchronous system made up of n processes and where up to t of them can crash, finding the weakest assumptions that such a system has to satisfy for a common leade...
Antonio Fernández Anta, Michel Raynal
IACR
2011
73views more  IACR 2011»
12 years 7 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr