Sciweavers

468 search results - page 69 / 94
» A Certified Digital Signature
Sort
View
DBSEC
1998
115views Database» more  DBSEC 1998»
14 years 9 days ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
ICISC
2000
102views Cryptology» more  ICISC 2000»
14 years 9 days ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
SSR
1997
93views more  SSR 1997»
14 years 8 days ago
Using Content-Derived Names for Configuration Management
Configuration management of compiled software artifacts (programs, libraries, icons, etc.) is a growing problem as software reuse becomes more prevalent. For an application compos...
Jeffrey K. Hollingsworth, Ethan L. Miller
ECCC
2010
78views more  ECCC 2010»
13 years 11 months ago
PCPs and the Hardness of Generating Synthetic Data
Assuming the existence of one-way functions, we show that there is no polynomial-time, differentially private algorithm A that takes a database D ({0, 1}d )n and outputs a "...
Jonathan Ullman, Salil P. Vadhan
IJMSO
2006
105views more  IJMSO 2006»
13 years 11 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia