122
click to vote
WPES
15 years 6 months ago
2003 ACM
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
122
click to vote
WPES
15 years 6 months ago
2003 ACM
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
105
click to vote
WPES
15 years 6 months ago
2003 ACM
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
129
click to vote
WPES
15 years 6 months ago
2003 ACM
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
138
click to vote
WPES
15 years 6 months ago
2003 ACM
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
|