Sciweavers

11739 search results - page 2228 / 2348
» Slideshow: functional presentations
Sort
View
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 1 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
SDMW
2009
Springer
14 years 1 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
SEMWEB
2009
Springer
14 years 1 months ago
Enrichment and Ranking of the YouTube Tag Space and Integration with the Linked Data Cloud
The increase of personal digital cameras with video functionality and video-enabled camera phones has increased the amount of user-generated videos on the Web. People are spending ...
Smitashree Choudhury, John G. Breslin, Alexandre P...
CRYPTO
2001
Springer
113views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
OAEP Reconsidered
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widel...
Victor Shoup
ESOP
2001
Springer
14 years 1 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
« Prev « First page 2228 / 2348 Last » Next »