Sciweavers

262 search results - page 34 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
13 years 12 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
IPPS
2007
IEEE
14 years 2 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
DAGSTUHL
2006
13 years 9 months ago
Efficient multi-step query processing for EMD-based similarity
Abstract. Similarity search in large multimedia databases requires efficient query processing based on suitable similarity models. Similarity models consist of a feature extraction...
Ira Assent, Thomas Seidl
IADIS
2003
13 years 9 months ago
A Web-Based Education Tool for Collaborative Learning of Assembly Programming
A visual simulator has been developed as an example of Web-based education tool, which is designed for students to understand graphically internal behavior and structure of comput...
Yoshiro Imai, Shinji Tomita
ESOP
2008
Springer
13 years 9 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...