Sciweavers

905 search results - page 91 / 181
» Public key distribution through
Sort
View
JCP
2006
116views more  JCP 2006»
13 years 8 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
SIGKDD
2008
87views more  SIGKDD 2008»
13 years 8 months ago
Blogosphere: research issues, tools, and applications
Weblogs, or Blogs, have facilitated people to express their thoughts, voice their opinions, and share their experiences and ideas. Individuals experience a sense of community, a f...
Nitin Agarwal, Huan Liu
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 6 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
SIGECOM
2010
ACM
219views ECommerce» more  SIGECOM 2010»
14 years 1 months ago
Revenue maximization with a single sample
We design and analyze approximately revenue-maximizing auctions in general single-parameter settings. Bidders have publicly observable attributes, and we assume that the valuation...
Peerapong Dhangwatnotai, Tim Roughgarden, Qiqi Yan
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
14 years 5 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis