Sciweavers

1599 search results - page 26 / 320
» Probabilistic Analysis of Anonymity
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
PODC
2010
ACM
14 years 2 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
NSDI
2007
14 years 15 days ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
EACL
2006
ACL Anthology
13 years 11 months ago
Improving Probabilistic Latent Semantic Analysis with Principal Component Analysis
Probabilistic Latent Semantic Analysis (PLSA) models have been shown to provide a better model for capturing polysemy and synonymy than Latent Semantic Analysis (LSA). However, th...
Ayman Farahat, Francine Chen
ICML
2006
IEEE
14 years 11 months ago
Robust probabilistic projections
Principal components and canonical correlations are at the root of many exploratory data mining techniques and provide standard pre-processing tools in machine learning. Lately, p...
Cédric Archambeau, Michel Verleysen, Nicola...