Sciweavers

15375 search results - page 352 / 3075
» cans 2008
Sort
View
CSR
2008
Springer
15 years 6 months ago
Public Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computat...
Denis Osin, Vladimir Shpilrain
141
Voted
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
15 years 6 months ago
Mining Topological Relations from the Web
Topological relations between geographic regions are of interest in many applications. When the exact boundaries of regions are not available, such relations can be established by...
Steven Schockaert, Philip D. Smart, Alia I. Abdelm...
ESWS
2008
Springer
15 years 6 months ago
An Entity Name System (ENS) for the Semantic Web
In this paper, we argue that implementing the grand vision of the Semantic Web would greatly benefit from a service which can enable the reuse of globally unique URIs across semant...
Paolo Bouquet, Heiko Stoermer, Barbara Bazzanella
ESWS
2008
Springer
15 years 6 months ago
A Natural Language Query Interface to Structured Information
Accessing structured data such as that encoded in ontologies and knowledge bases can be done using either syntactically complex formal query languages like SPARQL or complicated fo...
Valentin Tablan, Danica Damljanovic, Kalina Bontch...
EUROCRYPT
2008
Springer
15 years 6 months ago
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Predicate encryption is a new paradigm for public-key encryption generalizing, among other things, identity-based encryption. In a predicate encryption scheme, secret keys corresp...
Jonathan Katz, Amit Sahai, Brent Waters