Sciweavers

3395 search results - page 625 / 679
» Computational Differential Privacy
Sort
View
DRM
2003
Springer
15 years 8 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
SAC
2009
ACM
15 years 8 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
OOPSLA
2009
Springer
15 years 8 months ago
Agile anthropology and Alexander's architecture: an essay in three voices
During its formative decades the software community looked twice to the theories of ChristopherAlexander for inspiration, both times failing to completely master the architect’s...
Jenny Quillien, Pam Rostal, Dave West
126
Voted
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 7 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
119
Voted
ECAI
2006
Springer
15 years 7 months ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer