Sciweavers

1018 search results - page 93 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
14 years 2 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
FC
2009
Springer
67views Cryptology» more  FC 2009»
13 years 12 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
DGO
2003
97views Education» more  DGO 2003»
13 years 9 months ago
Designing a Metadata -Driven Visual Information Browser for Federal Statistics
When looking for federal statistics, finding the right table, chart or report can be a daunting task for anyone not thoroughly familiar with the federal statistical system. Search...
Bill Kules, Ben Shneiderman
WPES
2003
ACM
14 years 1 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
IPSN
2010
Springer
13 years 10 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos