Sciweavers

IWSEC
2007
Springer
14 years 1 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
IWSEC
2007
Springer
14 years 1 months ago
Privacy-Preserving Eigentaste-Based Collaborative Filtering
With the evolution of e-commerce, privacy is becoming a major concern. Many e-companies employ collaborative filtering (CF) techniques to increase their sales by providing truthfu...
Ibrahim Yakut, Huseyin Polat
IWSEC
2007
Springer
14 years 1 months ago
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks
Abstract. Advertisement dissemination is a promising M-commerce application which exploits the capabilities of mobile ad hoc networks to increase the visibility of the products bei...
Alexandre Viejo, Francesc Sebé, Josep Domin...
ISPEC
2007
Springer
14 years 1 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
ISPEC
2007
Springer
14 years 1 months ago
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do no...
Yanjiang Yang, Robert H. Deng, Feng Bao
ISPEC
2007
Springer
14 years 1 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
ISPEC
2007
Springer
14 years 1 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ISI
2007
Springer
14 years 1 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
ISI
2007
Springer
14 years 1 months ago
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks
Abstract— Community discovery has drawn significant research interests among researchers from many disciplines for its increasing application in multiple, disparate areas, inclu...
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C....
ISI
2007
Springer
14 years 1 months ago
FACT: Fast Algorithm for Categorizing Text
— With the ever-increasing number of digital documents, the ability to automatically classifying those documents both quickly and accurately is becoming more critical and difficu...
Saket S. R. Mengle, Nazli Goharian, Alana Platt