Sciweavers

96 search results - page 3 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
CCS
2005
ACM
13 years 11 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
ICPR
2006
IEEE
14 years 7 months ago
Gaussian mixture pdf in one-class classification: computing and utilizing confidence values
In this study a confidence measure for probability density functions (pdfs) is presented. The measure can be used in one-class classification to select a pdf threshold for class i...
Jarmo Ilonen, Pekka Paalanen, Joni-Kristian Kamara...
CHI
2003
ACM
14 years 6 months ago
Exploring the distribution of online healthcare information
Motivated by the importance of retrieving comprehensive healthcare information, we analyzed how information about 12 concepts related to a widely available healthcare topic is dis...
Suresh K. Bhavnani, Renju T. Jacob, Jennifer Nardi...
SDMW
2009
Springer
13 years 10 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
AAAI
2006
13 years 7 months ago
Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth
We examine a setting in which a buyer wishes to purchase probabilistic information from some agent. The seller must invest effort in order to gain access to the information, and m...
Aviv Zohar, Jeffrey S. Rosenschein