Sciweavers

1834 search results - page 328 / 367
» Public Key Cryptography
Sort
View
INFORMATICALT
2010
92views more  INFORMATICALT 2010»
13 years 6 months ago
New Fuzzy Identity-Based Encryption in the Standard Model
In a fuzzy identity-based encryption (IBE) scheme, a user with the secret key for an identity ID is able to decrypt a ciphertext encrypted with another identity ID if and only if I...
Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang
JTAER
2010
147views more  JTAER 2010»
13 years 6 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
JUCS
2010
139views more  JUCS 2010»
13 years 6 months ago
LemmaGen: Multilingual Lemmatisation with Induced Ripple-Down Rules
: Lemmatisation is the process of finding the normalised forms of words appearing in text. It is a useful preprocessing step for a number of language engineering and text mining t...
Matjaz Jursic, Igor Mozetic, Tomaz Erjavec, Nada L...
JUCS
2010
130views more  JUCS 2010»
13 years 6 months ago
From Analog to Digital Television; Strategies to Promote Rapid Adaptation and Awareness
: Europe is currently transitioning to digital terrestrial television and is aimed to replace all analog infrastructures by 2012. Besides replacing all broadcasting networks in Eur...
Manuel J. Fernández Iglesias, Luis Á...
SIGOPS
2010
186views more  SIGOPS 2010»
13 years 6 months ago
Are clouds ready for large distributed applications?
Cloud computing carries the promise of providing powerful ls and abstractions that could transform the way IT services are delivered today. In order to establish the readiness of ...
Kunwadee Sripanidkulchai, Sambit Sahu, Yaoping Rua...