Sciweavers

9 search results - page 2 / 2
» fc 2001
Sort
View
NSPW
2003
ACM
14 years 24 days ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 1 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
FC
2001
Springer
97views Cryptology» more  FC 2001»
14 years 1 days ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
DLOG
2001
13 years 9 months ago
Using Lazy Unfolding for the Computation of Least Common Subsumers
For description logics with existential restrictions, the size of the least common subsumer (lcs) of concept descriptions may grow exponentially in the size of the concept descrip...
Anni-Yasmin Turhan, Ralf Molitor