Sciweavers

334 search results - page 66 / 67
» trust 2010
Sort
View
TIFS
2010
186views more  TIFS 2010»
13 years 3 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 3 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
ACSAC
2010
IEEE
13 years 3 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou
FOCS
2010
IEEE
13 years 3 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
13 years 3 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos