Sciweavers

759 search results - page 32 / 152
» What Can Be Implemented Anonymously
Sort
View
ASIACRYPT
2010
Springer
13 years 8 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
WIRI
2005
IEEE
14 years 3 months ago
A Lightweight Approach to Semantic Web Service Synthesis
Web service technologies are becoming a new paradigm for distributed computing. With increasing number of web services available on the internet, there is an urgent need for infor...
Jianguo Lu, Yijun Yu, John Mylopoulos
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
14 years 10 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 12 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
USENIX
2000
13 years 11 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...