Sciweavers

169 search results - page 28 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
OOPSLA
2005
Springer
15 years 5 months ago
Safe futures for Java
is a simple and elegant abstraction that allows concurrency to be expressed often through a relatively small rewrite of a sequential program. In the absence of side-effects, futur...
Adam Welc, Suresh Jagannathan, Antony L. Hosking
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
16 years 1 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
CSCW
1998
ACM
15 years 3 months ago
Evaluating Image Filtering Based Techniques in Media Space Applications
Media space applications that promote informal awareness in an organization confront an inevitable paradox: the shared video connections between offices and rooms that promote inf...
Qiang Alex Zhao, John T. Stasko
JSAC
2011
142views more  JSAC 2011»
14 years 6 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 11 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy