Sciweavers

591 search results - page 24 / 119
» Securing the Broker Pattern
Sort
View
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
14 years 9 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
PKC
2010
Springer
118views Cryptology» more  PKC 2010»
13 years 10 months ago
Text Search Protocols with Simulation Based Security
This paper presents an efficient protocol for securely computing the fundamental problem of pattern matching. This problem is defined in the two-party setting, where party P1 hold...
Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 10 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
TON
2008
102views more  TON 2008»
13 years 8 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...