Sciweavers

195 search results - page 2 / 39
» Hiding the complexity of LBS
Sort
View
EUROCRYPT
2005
Springer
13 years 11 months ago
Reducing Complexity Assumptions for Statistically-Hiding Commitment
We revisit the following question: what are the minimal assumptions needed to construct statistically-hiding commitment schemes? Naor et al. show how to construct such schemes bas...
Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-...
SAC
2010
ACM
13 years 4 days ago
Improving complex distributed software system availability through information hiding
Li Wang, Yair Leiferman, Shangping Ren, Kevin A. K...
WISEC
2010
ACM
13 years 3 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
ICCAD
1998
IEEE
83views Hardware» more  ICCAD 1998»
13 years 9 months ago
Signature hiding techniques for FPGA intellectual property protection
John Lach, William H. Mangione-Smith, Miodrag Potk...