Sciweavers

162 search results - page 21 / 33
» A note on an extension of PDL
Sort
View
FC
2005
Springer
171views Cryptology» more  FC 2005»
15 years 5 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
CSFW
2003
IEEE
15 years 5 months ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
ICDM
2003
IEEE
98views Data Mining» more  ICDM 2003»
15 years 5 months ago
On the Privacy Preserving Properties of Random Data Perturbation Techniques
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large...
Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamo...
BTW
2003
Springer
170views Database» more  BTW 2003»
15 years 5 months ago
Executing Nested Queries
Abstract: Optimization of nested queries, in particular finding equivalent “flattened” queries for queries that employ the SQL sub-query construct, has been researched extensiv...
Goetz Graefe
EDBT
2009
ACM
172views Database» more  EDBT 2009»
15 years 4 months ago
Continuous visible nearest neighbor queries
In this paper, we identify and solve a new type of spatial queries, called continuous visible nearest neighbor (CVNN) search. Given a data set P, an obstacle set O, and a query li...
Yunjun Gao, Baihua Zheng, Wang-Chien Lee, Gencai C...