Sciweavers

522 search results - page 75 / 105
» Answering Aggregation Queries in a Secure System Model
Sort
View
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
JDM
2000
128views more  JDM 2000»
13 years 7 months ago
Distributed Database Design for Mobile Geographical Applications
Advanced Traveler Information Systems (ATIS) require e cient information retrieval and updating in a dynamic environment at di erent geographical scales. ATIS applications are use...
Manhoi Choy, Mei-Po Kwan, Hong Va Leong
COOPIS
2004
IEEE
13 years 11 months ago
Learning Classifiers from Semantically Heterogeneous Data
Semantically heterogeneous and distributed data sources are quite common in several application domains such as bioinformatics and security informatics. In such a setting, each dat...
Doina Caragea, Jyotishman Pathak, Vasant Honavar
CCS
2005
ACM
14 years 1 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...