Sciweavers

2421 search results - page 71 / 485
» Message from the Editor-in-Chief
Sort
View
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 10 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
CEAS
2011
Springer
12 years 9 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong
ACISP
2005
Springer
14 years 2 months ago
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
A blind signature scheme is a protocol for obtaining a digital signature from a signer, but the signer can neither learn the messages he/she sign nor the signatures the recipients ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
ASIACRYPT
2009
Springer
14 years 29 days ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ICWSM
2009
13 years 6 months ago
Compositionality Principle in Recognition of Fine-Grained Emotions from Text
The recognition of personal emotional state or sentiment conveyed through text is the main task we address in our research. The communication of emotions through text messaging an...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...