Sciweavers

1795 search results - page 199 / 359
» Security Models and Information Flow
Sort
View
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 8 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
ICML
2007
IEEE
16 years 5 months ago
Unsupervised prediction of citation influences
Publication repositories contain an abundance of information about the evolution of scientific research areas. We address the problem of creating a visualization of a research are...
Laura Dietz, Steffen Bickel, Tobias Scheffer
MONET
2011
14 years 7 months ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
CIKM
2005
Springer
15 years 10 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
DRM
2004
Springer
15 years 9 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia