Sciweavers

269 search results - page 20 / 54
» Who Thinks Who Knows Who
Sort
View
MDAI
2007
Springer
14 years 1 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
AINA
2006
IEEE
14 years 1 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
PET
2005
Springer
14 years 25 days ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov
ATAL
2004
Springer
14 years 22 days ago
A Complete and Decidable Logic for Resource-Bounded Agents
We propose a context-logic style formalism, Timed Reasoning Logics (TRL), to describe resource-bounded reasoners who take time to derive consequences of their knowledge. The seman...
Natasha Alechina, Brian Logan, Mark Whitsey
FGIT
2009
Springer
13 years 12 months ago
Data Analysis Methods for Library Marketing
Our society is rapidly changing into information society, where the needs and requests of the people on information access vary vigorously depending who they are. Library's m...
Toshiro Minami, Eunja Kim