Sciweavers

796 search results - page 34 / 160
» The Anonymous Subgraph Problem
Sort
View
ASIACRYPT
2005
Springer
15 years 7 months ago
Quantum Anonymous Transmissions
We consider the problem of hiding sender and receiver of classical and quantum bits (qubits), even if all physical transmissions can be monitored. We present a quantum protocol for...
Matthias Christandl, Stephanie Wehner
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
15 years 1 days ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
WAOA
2010
Springer
209views Algorithms» more  WAOA 2010»
15 years 5 days ago
Densest k-Subgraph Approximation on Intersection Graphs
We study approximation solutions for the densest k-subgraph problem (DS-k) on several classes of intersection graphs. We adopt the concept of -quasi elimination orders, introduced ...
Danny Z. Chen, Rudolf Fleischer, Jian Li
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 2 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor