Technicka univerzita v Liberci

Displaying 1-4 of 4 results

  • White Papers // Nov 2012

    Efficient Group Signatures in the Standard Model

    In a group signature scheme, group members are able to sign on behalf of the group. Since the introduction of this cryptographic authentication mechanism, several schemes have been proposed but only few of them enjoy a security in the standard model. Moreover, those provided in the standard model suffer the...

    Provided By Technicka univerzita v Liberci

  • White Papers // May 2012

    Hot or Not: Interactive Content Search Using Comparisons

    In interactive content search through comparisons, a user searching for a target object in a database is asked to select the object most similar to her target from a small list of objects. A new object list is then presented to the user based on her earlier selections. This process...

    Provided By Technicka univerzita v Liberci

  • White Papers // Sep 2011

    Characterizing Home Networks With HomeNet Profiler

    This paper presents the first large-scale study of home networks. The authors design HomeNet Profiler, a tool that runs on an end-host in the home to collect data from home networks. HomeNet Profiler collects a wide range of measurements including: the set of devices, the set of services (with UPnP...

    Provided By Technicka univerzita v Liberci

  • White Papers // Jul 2011

    Mining and Modeling Large Scale Cell Phone Data

    Cell phones are ubiquitous in modern life and the call records collected by network operators are a powerful tool to study the behavior of cell phone users, and how those users use network resources, at previously impossible-to-achieve scales. In this paper, the authors report on results from the analysis of...

    Provided By Technicka univerzita v Liberci

  • White Papers // Nov 2012

    Efficient Group Signatures in the Standard Model

    In a group signature scheme, group members are able to sign on behalf of the group. Since the introduction of this cryptographic authentication mechanism, several schemes have been proposed but only few of them enjoy a security in the standard model. Moreover, those provided in the standard model suffer the...

    Provided By Technicka univerzita v Liberci

  • White Papers // May 2012

    Hot or Not: Interactive Content Search Using Comparisons

    In interactive content search through comparisons, a user searching for a target object in a database is asked to select the object most similar to her target from a small list of objects. A new object list is then presented to the user based on her earlier selections. This process...

    Provided By Technicka univerzita v Liberci

  • White Papers // Jul 2011

    Mining and Modeling Large Scale Cell Phone Data

    Cell phones are ubiquitous in modern life and the call records collected by network operators are a powerful tool to study the behavior of cell phone users, and how those users use network resources, at previously impossible-to-achieve scales. In this paper, the authors report on results from the analysis of...

    Provided By Technicka univerzita v Liberci

  • White Papers // Sep 2011

    Characterizing Home Networks With HomeNet Profiler

    This paper presents the first large-scale study of home networks. The authors design HomeNet Profiler, a tool that runs on an end-host in the home to collect data from home networks. HomeNet Profiler collects a wide range of measurements including: the set of devices, the set of services (with UPnP...

    Provided By Technicka univerzita v Liberci