Sciweavers

592 search results - page 30 / 119
» Learning of personalized security settings
Sort
View
DBSEC
2010
129views Database» more  DBSEC 2010»
13 years 9 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
KDD
1995
ACM
248views Data Mining» more  KDD 1995»
13 years 11 months ago
Data Mining for Loan Evaluation at ABN AMRO: A Case Study
Wedescribe a case study in data miningfor personal loan evaluation, performed at the ABNAMRObank in the Netherlands. Historical data of clients and their pay-backbehaviourare used...
A. J. Feelders, A. J. F. le Loux, J. W. van't Zand
JOC
2010
123views more  JOC 2010»
13 years 2 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
SASN
2003
ACM
14 years 1 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CIA
2007
Springer
14 years 2 months ago
A Probabilistic Framework for Decentralized Management of Trust and Quality
In this paper, we propose a probabilistic framework targeting three important issues in the computation of quality and trust in decentralized systems. Specifically, our approach a...
Le-Hung Vu, Karl Aberer