Sciweavers

1906 search results - page 322 / 382
» Data Privacy
Sort
View
112
Voted
CCS
2008
ACM
15 years 4 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
122
Voted
CORR
2012
Springer
227views Education» more  CORR 2012»
13 years 10 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
ICSOC
2005
Springer
15 years 8 months ago
Handling Faults in Decentralized Orchestration of Composite Web Services
Abstract. Composite web services can be orchestrated in a decentralized manner by breaking down the original service specification into a set of partitions and executing them on a...
Girish Chafle, Sunil Chandra, Pankaj Kankar, Vijay...
JTAER
2008
103views more  JTAER 2008»
15 years 2 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
LREC
2010
237views Education» more  LREC 2010»
15 years 4 months ago
The Alborada-I3A Corpus of Disordered Speech
This paper describes the "Alborada-I3A" corpus of disordered speech, acquired during the recent years for the research in different speech technologies for the handicapp...
Oscar Saz, Eduardo Lleida, Carlos Vaquero, William...