Sciweavers

2846 search results - page 17 / 570
» Not one click for security
Sort
View
SECPERU
2006
IEEE
15 years 9 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
15 years 9 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
OOPSLA
1997
Springer
15 years 8 months ago
Garbage Collecting the World: One Car at a Time
A new garbage collection algorithm for distributed object systems, called DMOS (Distributed Mature Object Space), is presented. It is derived from two previous algorithms, MOS (Ma...
Richard L. Hudson, Ronald Morrison, J. Eliot B. Mo...
SIGIR
2010
ACM
15 years 7 months ago
Learning more powerful test statistics for click-based retrieval evaluation
Interleaving experiments are an attractive methodology for evaluating retrieval functions through implicit feedback. Designed as a blind and unbiased test for eliciting a preferen...
Yisong Yue, Yue Gao, Olivier Chapelle, Ya Zhang, T...
AIRWEB
2008
Springer
15 years 5 months ago
Query-log mining for detecting spam
Every day millions of users search for information on the web via search engines, and provide implicit feedback to the results shown for their queries by clicking or not onto them...
Carlos Castillo, Claudio Corsi, Debora Donato, Pao...