Yangzhou University

Displaying 1-2 of 2 results

  • White Papers // Dec 2011

    A Non-Interactive Deniable Authentication Scheme in the Standard Model

    Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interactive schemes, non-interactive deniable authentication schemes improve communication efficiency. Currently, several non-interactive deniable authentication schemes have been...

    Provided By Yangzhou University

  • White Papers // Dec 2010

    A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation

    Collaborative filtering algorithm is one of the most successful technologies used in personalized recommendation system. However, traditional algorithms focus only on user ratings and do not consider the changes of user interest and the credibility of ratings data, which affected the quality of the system's recommendation seriously. To solve this...

    Provided By Yangzhou University

  • White Papers // Dec 2010

    A Collaborative Filtering Recommendation Algorithm Based on User Interest Change and Trust Evaluation

    Collaborative filtering algorithm is one of the most successful technologies used in personalized recommendation system. However, traditional algorithms focus only on user ratings and do not consider the changes of user interest and the credibility of ratings data, which affected the quality of the system's recommendation seriously. To solve this...

    Provided By Yangzhou University

  • White Papers // Dec 2011

    A Non-Interactive Deniable Authentication Scheme in the Standard Model

    Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast to interactive schemes, non-interactive deniable authentication schemes improve communication efficiency. Currently, several non-interactive deniable authentication schemes have been...

    Provided By Yangzhou University