Sciweavers

426 search results - page 69 / 86
» Specification, Abduction, and Proof
Sort
View
ESORICS
2006
Springer
14 years 1 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
FOSAD
2000
Springer
14 years 1 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
14 years 1 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
AI
2008
Springer
13 years 12 months ago
A Novel Approach for Social Behavior Analysis of the Blogosphere
The web, as a real mass medium, has become an invaluable data source for Information Extraction and Retrieval systems. Digital authoring is a relatively new style of communication,...
Reza Zafarani, Mohammad-Amin Jashki, Hamidreza Bag...
BIRTHDAY
2008
Springer
13 years 12 months ago
The Church-Turing Thesis over Arbitrary Domains
The Church-Turing Thesis has been the subject of many variations and interpretations over the years. Specifically, there are versions that refer only to functions over the natural ...
Udi Boker, Nachum Dershowitz