Sciweavers

3395 search results - page 620 / 679
» Computational Differential Privacy
Sort
View
DAWAK
2007
Springer
15 years 9 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
114
Voted
OOPSLA
2007
Springer
15 years 9 months ago
Transactions with isolation and cooperation
We present the TIC (Transactions with Isolation and Cooperation) model for concurrent programming. TIC adds to standard transactional memory the ability for a transaction to obser...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
135
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 9 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 9 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
ADHOCNOW
2006
Springer
15 years 9 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel