Sciweavers

712 search results - page 35 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CCS
1998
ACM
15 years 1 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
ACISP
1997
Springer
15 years 1 months ago
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions
Abstract. Highly nonlinear Boolean functions occupy an important position in the design of secure block as well as stream ciphers. This paper proves two new lower bounds on the non...
Xian-Mo Zhang, Yuliang Zheng
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 3 days ago
Differentially private transit data publication: a case study on the montreal transportation system
With the wide deployment of smart card automated fare collection (SCAFC) systems, public transit agencies have been benefiting from huge volume of transit data, a kind of sequent...
Rui Chen, Benjamin C. M. Fung, Bipin C. Desai, N&e...
AICT
2006
IEEE
128views Communications» more  AICT 2006»
15 years 3 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
66
Voted
CSSC
2010
121views more  CSSC 2010»
14 years 7 months ago
An Efficient Estimation for Switching Regression Models: A Monte Carlo Study
This paper investigates an efficient estimation method for a class of switching regressions based on the characteristic function (CF). We show that with the exponential weighting ...
Dinghai Xu