Sciweavers

28 search results - page 6 / 6
» Securing the Distribution and Storage of Secrets with Truste...
Sort
View
IJWIN
2006
119views more  IJWIN 2006»
13 years 5 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 10 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ATAL
2007
Springer
13 years 12 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak