Sciweavers

550 search results - page 8 / 110
» pairing 2009
Sort
View
PERCOM
2009
ACM
14 years 11 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
14 years 11 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
VLDB
2009
ACM
165views Database» more  VLDB 2009»
14 years 11 months ago
Online pairing of VoIP conversations
This paper answers the following question; given a multiplicity of evolving 1-way conversations, can a machine or an algorithm discern the conversational pairs in an online fashio...
Michail Vlachos, Aris Anagnostopoulos, Olivier Ver...
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 8 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
LREC
2010
159views Education» more  LREC 2010»
14 years 10 days ago
Bilingual Lexicon Induction: Effortless Evaluation of Word Alignment Tools and Production of Resources for Improbable Language P
In this paper, we present a simple protocol to evaluate word aligners on bilingual lexicon induction tasks from parallel corpora. Rather than resorting to gold standards, it relie...
Adrien Lardilleux, Julien Gosme, Yves Lepage