Sciweavers

208 search results - page 31 / 42
» Relations Among Privacy Notions
Sort
View
SIAMCOMP
2011
13 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
COLCOM
2009
IEEE
14 years 1 months ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed
TMM
2002
133views more  TMM 2002»
13 years 8 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
SIGKDD
2010
159views more  SIGKDD 2010»
13 years 7 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....