Sciweavers

796 search results - page 127 / 160
» The Anonymous Subgraph Problem
Sort
View
SIGCSE
2006
ACM
211views Education» more  SIGCSE 2006»
14 years 2 months ago
Multimodal communication in the classroom: what does it mean for us?
Experimentation has shown that in-class educational technologies, by permitting anonymous, authored participation, can dramatically alter student communications in the classroom. ...
Tamara Denning, William G. Griswold, Beth Simon, M...
WMASH
2004
ACM
14 years 1 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
SACMAT
2010
ACM
14 years 1 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 2 days ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li