Sciweavers

733 search results - page 77 / 147
» Private inference control
Sort
View
ICNP
1999
IEEE
14 years 2 months ago
Receiver-Cooperative Bandwidth Management for Layered Multicast
In this paper, we propose a receiver-cooperative bandwidth management method for layered multicast streams, considering not only bandwidth requirements but also receivers' pr...
Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higash...
EUROCRYPT
1999
Springer
14 years 2 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 2 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
CSCW
1996
ACM
14 years 2 months ago
Supporting Multi-User, Multi-Applet Workspaces in CBE
Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to shared workspaces...
Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri