Sciweavers

115 search results - page 18 / 23
» Boosting and Differential Privacy
Sort
View
NETWORK
2006
116views more  NETWORK 2006»
13 years 9 months ago
Quality of service support in IEEE 802.16 networks
During the last few years, users all over the world have become more and more accustomed to the availability of broadband access. This has boosted the use of a wide variety both o...
Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi...
CCS
2008
ACM
13 years 11 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
ESORICS
2009
Springer
14 years 10 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
NORDSEC
2009
Springer
14 years 4 months ago
Facilitating the Adoption of Tor by Focusing on a Promising Target Group
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has ...
Heiko Roßnagel, Jan Zibuschka, Lexi Pimenidi...
ACSAC
2008
IEEE
14 years 4 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger