Sciweavers

CANS
2010
Springer
146views Cryptology» more  CANS 2010»
13 years 9 months ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 9 months ago
Integrating User's Domain Knowledge with Association Rule Mining
This paper presents a variation of Apriori algorithm that includes the role of domain expert to guide and speed up the overall knowledge discovery task. Usually, the user is inter...
Vikram Singh, Sapna Nagpal