Sciweavers

298 search results - page 53 / 60
» Strong Anonymous Signatures
Sort
View
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 1 months ago
Understanding the Relationship between Justice and Team Goal Commitment in Virtual Project Teams: An Empirical Investigation
Virtual project teams are spontaneous group configurations that endeavor to overcome spatial and temporal restrictions in bringing together distant experts to create just-in-time ...
Eric Tze Kuan Lim, Yu-Ting Caisy Hung
ACNS
2007
Springer
96views Cryptology» more  ACNS 2007»
13 years 11 months ago
Universal Accumulators with Efficient Nonmembership Proofs
Based on the notion of accumulators, we propose a new cryptographic scheme called universal accumulators. This scheme enables one to commit to a set of values using a short accumul...
Jiangtao Li, Ninghui Li, Rui Xue
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
13 years 11 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
ACSC
2007
IEEE
14 years 1 months ago
Periodical Payment Model Using Restricted Proxy Certificates
In this paper we shall introduce a new electronic payment concept based on the popular direct debit payment model, entitled periodical payments. The direct debit model currently i...
Grigori Goldman
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 1 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester