Sciweavers

5752 search results - page 146 / 1151
» Informative Labeling Schemes
Sort
View
COMPSAC
2005
IEEE
15 years 4 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 2 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
IEEECIT
2005
IEEE
15 years 8 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
ISW
1997
Springer
15 years 6 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang
EUC
2004
Springer
15 years 7 months ago
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query...
Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai