Sciweavers

759 search results - page 29 / 152
» What Can Be Implemented Anonymously
Sort
View
EUROPKI
2009
Springer
13 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
14 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
ICMB
2007
IEEE
136views Business» more  ICMB 2007»
14 years 4 months ago
The Emergence of the Mobile Enterprise: A Value-Driven Perspective
The mobile enterprise is an emerging organizational form that has resulted in a paradigm shift of how business is done. However, only little theoretical work has been done to expl...
Rahul C. Basole
WOWMOM
2005
ACM
75views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Towards an Asynchronous Dissemination and a Safe Deployment of Lightweight Programs in Mobile Networks
This paper presents the design and the implementation of a platform allowing owners of mobile devices to exchange software application programs using a peer-to-peer scheme in hybr...
Hervé Roussain, Nicolas Le Sommer, Fr&eacut...
FOSAD
2000
Springer
14 years 1 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...