Sciweavers

260 search results - page 2 / 52
» Providing Data Group Anonymity Using Concentration Differenc...
Sort
View
ASIACRYPT
2004
Springer
13 years 9 months ago
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
Group signature schemes are cryptographic systems that provide revocable anonymity for signers. We propose a group signature scheme with constant-size public key and signature leng...
Lan Nguyen, Reihaneh Safavi-Naini
VL
2007
IEEE
120views Visual Languages» more  VL 2007»
13 years 11 months ago
Finding Gender Differences in End-User Debugging: A Data Mining Approach
We are currently investigating what types of end user personas (or homogeneous groups in the population) exist and what works for or hinders each in end-user debugging. These pers...
Valentina Grigoreanu
CERA
2004
89views more  CERA 2004»
13 years 5 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
CPAIOR
2005
Springer
13 years 10 months ago
Group Construction for Airline Cabin Crew: Comparing Constraint Programming with Branch and Price
Producing work schedules for airline crew normally results in individually different schedules. Some airlines do however want to give the same schedule to groups of people. The con...
Jesper Hansen, Tomas Lidén
CSE
2009
IEEE
14 years 1 days ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren