Sciweavers

CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 2 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
INTEROP
1999
Springer
126views GIS» more  INTEROP 1999»
13 years 8 months ago
Identifying Semantically Similar Elements in Heterogeneous Spatial Databases Using Predicate Logic Expressions
For data to be successfully integrated, semantically similar database elements must be identified as candidates for merging. However, there may be significant differences between ...
Kristin Stock, David Pullar