Sciweavers

195 search results - page 2 / 39
» Hiding the complexity of LBS
Sort
View
EUROCRYPT
2005
Springer
13 years 11 months ago
Reducing Complexity Assumptions for Statistically-Hiding Commitment
We revisit the following question: what are the minimal assumptions needed to construct statistically-hiding commitment schemes? Naor et al. show how to construct such schemes bas...
Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-...
SAC
2010
ACM
13 years 17 days ago
Improving complex distributed software system availability through information hiding
Li Wang, Yair Leiferman, Shangping Ren, Kevin A. K...
WISEC
2010
ACM
13 years 3 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
ICCAD
1998
IEEE
83views Hardware» more  ICCAD 1998»
13 years 10 months ago
Signature hiding techniques for FPGA intellectual property protection
John Lach, William H. Mangione-Smith, Miodrag Potk...