Sciweavers

108 search results - page 7 / 22
» Direct anonymous attestation
Sort
View
STACS
2010
Springer
14 years 4 months ago
On Iterated Dominance, Matrix Elimination, and Matched Paths
We study computational problems that arise in the context of iterated dominance in anonymous games, and show that deciding whether a game can be solved by means of iterated weak d...
Felix Brandt, Felix A. Fischer, Markus Holzer
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
HRI
2010
ACM
13 years 8 months ago
Robots asking for directions: the willingness of passers-by to support robots
—This paper reports about a human-robot interaction field trial conducted with the autonomous mobile robot ACE (Autonomous City Explorer) in a public place, where the ACE robot ...
Astrid Weiss, Judith Igelsböck, Manfred Tsche...
IJFCS
2007
77views more  IJFCS 2007»
13 years 9 months ago
Optimal Construction of Sense of Direction in a Torus by a Mobile Agent
Sense of direction is a property of the edge-labeling of a network whose availability facilitates computations and often decreases their complexity. In this paper we consider the ...
Hanane Becha, Paola Flocchini
IWSEC
2007
Springer
14 years 4 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai