Sciweavers

15254 search results - page 16 / 3051
» A k
Sort
View
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 3 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
IPL
1998
119views more  IPL 1998»
13 years 9 months ago
A 2.5-Factor Approximation Algorithm for the k-MST Problem
The k-MST problem requires finding that subset of at least k vertices of a given graph whose Minimum Spanning Tree has least weight amongst all subsets of at least k vertices. Th...
Sunil Arya, H. Ramesh
ICDE
2006
IEEE
184views Database» more  ICDE 2006»
14 years 11 months ago
l-Diversity: Privacy Beyond k-Anonymity
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Ki...
COMPSAC
2009
IEEE
14 years 4 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
DATE
2010
IEEE
198views Hardware» more  DATE 2010»
14 years 2 months ago
A 14 bit, 280 kS/s cyclic ADC with 100 dB SFDR
— This paper presents the design of a 14 bit, 280 kS/s
Thomas Froehlich, Vivek Sharma, Markus Bingesser