Sciweavers

1397 search results - page 140 / 280
» On the Need for Practical Formal Methods
Sort
View
149
Voted
NDSS
2009
IEEE
15 years 11 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
ICDM
2008
IEEE
97views Data Mining» more  ICDM 2008»
15 years 11 months ago
OntoDM: An Ontology of Data Mining
Motivated by the need for unification of the field of data mining and the growing demand for formalized representation of outcomes of research, we address the task of constructi...
Pance Panov, Saso Dzeroski, Larisa N. Soldatova
ICNP
2007
IEEE
15 years 10 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
EUROCRYPT
2007
Springer
15 years 10 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
IDEAS
2005
IEEE
101views Database» more  IDEAS 2005»
15 years 10 months ago
Rewriting-Based Optimization for XQuery Transformational Queries
The modern XML query language called XQuery includes advanced facilities both to query and to transform XML data. An XQuery query optimizer should be able to optimize any query. F...
Maxim Grinev, Peter Pleshachkov