Sciweavers

2372 search results - page 131 / 475
» Probabilistic calling context
Sort
View
ACSAC
2009
IEEE
14 years 5 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
APN
2005
Springer
14 years 4 months ago
The (True) Concurrent Markov Property and Some Applications to Markov Nets
Abstract. We study probabilistic safe Petri nets, a probabilistic extension of safe Petri nets interpreted under the true-concurrent semantics. In particular, the likelihood of pro...
Samy Abbes
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
14 years 2 months ago
The topic-perspective model for social tagging systems
In this paper, we propose a new probabilistic generative model, called Topic-Perspective Model, for simulating the generation process of social annotations. Different from other g...
Caimei Lu, Xiaohua Hu, Xin Chen, Jung-ran Park, Ti...
CSB
2004
IEEE
14 years 2 months ago
MISAE: A New Approach for Regulatory Motif Extraction
The recognition of regulatory motifs of co-regulated genes is essential for understanding the regulatory mechanisms. However, the automatic extraction of regulatory motifs from a ...
Zhaohui Sun, Jingyi Yang, Jitender S. Deogun