Sciweavers

2715 search results - page 182 / 543
» Database Publication Practices
Sort
View
VLDB
1994
ACM
149views Database» more  VLDB 1994»
14 years 9 days ago
Qualified Answers That Reflect User Needs and Preferences
This paper introduces a formalism to describe the needs and preferences of database users. Because of the precise formulation of these concepts, we have found an automatic and ver...
Terry Gaasterland, Jorge Lobo
CHI
2009
ACM
14 years 8 months ago
A vehicle for research: using street sweepers to explore the landscape of environmental community action
Researchers are developing mobile sensing platforms to facilitate public awareness of environmental conditions. However, turning such awareness into practical community action and...
Paul M. Aoki, R. J. Honicky, Alan M. Mainwaring, C...
WISTP
2009
Springer
14 years 3 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 2 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Simulatable VRFs with Applications to Multi-theorem NIZK
Abstract. This paper introduces simulatable verifiable random functions (sVRF). VRFs are similar to pseudorandom functions, except that they are also verifiable: corresponding to...
Melissa Chase, Anna Lysyanskaya