Sciweavers

CANS
2010
Springer
146views Cryptology» more  CANS 2010»
13 years 9 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 10 months ago
Integrating User's Domain Knowledge with Association Rule Mining
This paper presents a variation of Apriori algorithm that includes the role of domain expert to guide and speed up the overall knowledge discovery task. Usually, the user is inter...
Vikram Singh, Sapna Nagpal