Sciweavers

1834 search results - page 267 / 367
» Public Key Cryptography
Sort
View
AP2PC
2007
Springer
13 years 9 months ago
Design of a Secure and Decentralized Location Service for Agent Platforms
Abstract. Agent platforms designed for Internet-scale, open networks need scalable and secure location services for agents and services. The location service based on the Fonkey pu...
Benno J. Overeinder, Michel Oey, Reinier Timmer, R...
ACL
2008
13 years 9 months ago
Joint Processing and Discriminative Training for Letter-to-Phoneme Conversion
We present a discriminative structureprediction model for the letter-to-phoneme task, a crucial step in text-to-speech processing. Our method encompasses three tasks that have bee...
Sittichai Jiampojamarn, Colin Cherry, Grzegorz Kon...
ACL
2008
13 years 9 months ago
In-Browser Summarisation: Generating Elaborative Summaries Biased Towards the Reading Context
We investigate elaborative summarisation, where the aim is to identify supplementary information that expands upon a key fact. We envisage such summaries being useful when browsin...
Stephen Wan, Cécile Paris
IIWAS
2004
13 years 9 months ago
An Efficient Group Signature Based on the Discrete Logarithm Problem
Group signature schemes permit a group member signing on messages anonymously and unlinkably on behalf of a group. The anonymity can be revoked when arguments occurred. This paper...
Fuw-Yi Yang, Jinn-ke Jan
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 9 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim