Sciweavers

69 search results - page 5 / 14
» Statistical Properties of Factor Oracles
Sort
View
ASIACRYPT
2001
Springer
14 years 3 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
12 years 1 months ago
From user comments to on-line conversations
We present an analysis of user conversations in on-line social media and their evolution over time. We propose a dynamic model that predicts the growth dynamics and structural pro...
Chunyan Wang, Mao Ye, Bernardo A. Huberman
ASIACRYPT
2009
Springer
14 years 2 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ASIACRYPT
2010
Springer
13 years 9 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
ICMLA
2007
14 years 9 days ago
SVMotif: A Machine Learning Motif Algorithm
We describe SVMotif, a support vector machine-based learning algorithm for identification of cellular DNA transcription factor (TF) motifs extrapolated from known TF-gene interact...
Mark A. Kon, Yue Fan, Dustin T. Holloway, Charles ...