Sciweavers

2715 search results - page 23 / 543
» Database Publication Practices
Sort
View
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
14 years 9 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
SIGMOD
2005
ACM
156views Database» more  SIGMOD 2005»
14 years 8 months ago
A snapshot of public web services
Web Service Technology has been developing rapidly as it provides a flexible application-to-application interaction mechanism. Several ongoing research efforts focus on various as...
Jianchun Fan, Subbarao Kambhampati
CIDR
2007
84views Algorithms» more  CIDR 2007»
13 years 9 months ago
Public Health for the Internet (PHI)
Business incentives have brought us within a small factor of achieving the database community’s Grand Challenge set out in the Asilomar Report of 1998. This paper makes the case...
Joseph M. Hellerstein, Tyson Condie, Minos N. Garo...
ACISP
2005
Springer
14 years 1 months ago
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys
It is sometimes argued (as in [6]) that finding meaningful hash collisions might prove difficult. We show that at least one of the arguments involved is wrong, by showing that for...
Arjen K. Lenstra, Benne de Weger
ASIACRYPT
2001
Springer
14 years 9 days ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra