Sciweavers

1286 search results - page 6 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 7 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
WPES
2003
ACM
14 years 22 days ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
LWA
2008
13 years 9 months ago
Towards the Adaptation of Scientific Course Material powered by Communities of Practice
Several applications support the adaptation of course material. Even though most of these systems allow to specify interaction preferences or even employ user modeling techniques,...
Christine Müller
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 11 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
PDP
2006
IEEE
14 years 1 months ago
A View Based Analysis of Workflow Modeling Languages
The different approaches of emerging workflow modeling languages are manifold. Today, there exist many notations for workflow modeling with various specializations on different do...
Martin Vasko, Schahram Dustdar