Sciweavers

759 search results - page 33 / 152
» What Can Be Implemented Anonymously
Sort
View
DAGSTUHL
2003
13 years 11 months ago
Specializing visualization algorithms
Abstract In this paper we look at the potential of program specialization techniques in the context of visualization. In particular we look at partial evaluation and pass separatio...
Stephan Diehl
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ACSAC
2009
IEEE
14 years 4 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
CCS
2004
ACM
14 years 3 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
WORDS
2003
IEEE
14 years 3 months ago
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments
A new class of applications can now be envisaged with the emergence of both mobile ad hoc computing and ubiquitous computing. Applications of such kind are characterised by being ...
Hector A. Duran-Limon, Gordon S. Blair, Adrian Fri...