Sciweavers

1662 search results - page 48 / 333
» Privately Finding Specifications
Sort
View
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
15 years 6 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
FMCAD
2000
Springer
15 years 6 months ago
Automated Refinement Checking for Asynchronous Processes
Abstract. We consider the problem of refinement checking for asynchronous processes where refinement corresponds to stutter-closed language inclusion. Since an efficient algorithmi...
Rajeev Alur, Radu Grosu, Bow-Yaw Wang
CSCWD
2008
Springer
15 years 4 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
FOCS
2010
IEEE
15 years 14 days ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
CHI
2006
ACM
16 years 2 months ago
Discovering design drivers for mobile media solutions
We conducted user studies in 2000 and 2004 into digital media use, and discovered a number of constant findings even though the studies were separate both in geographically and ch...
Akseli Anttila, Younghee Jung