Sciweavers

4356 search results - page 95 / 872
» Communicating Transactions - (Extended Abstract)
Sort
View
PODS
2003
ACM
156views Database» more  PODS 2003»
15 years 10 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
ICCD
2000
IEEE
107views Hardware» more  ICCD 2000»
15 years 6 months ago
Architectural Impact of Secure Socket Layer on Internet Servers
Secure socket layer SSL is the most popular protocol used in the Internet for facilitating secure communications through authentication, encryption, and decryption. Although the...
Krishna Kant, Ravishankar K. Iyer, Prasant Mohapat...
VLDB
2005
ACM
397views Database» more  VLDB 2005»
15 years 10 months ago
Concurrency control and recovery for balanced B-link trees
Abstract. In this paper we present new concurrent and recoverable B-link-tree algorithms. Unlike previous algorithms, ours maintain the balance of the B-link tree at all times, so ...
Ibrahim Jaluta, Seppo Sippu, Eljas Soisalon-Soinin...
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
15 years 2 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
CARDIS
1998
Springer
121views Hardware» more  CARDIS 1998»
15 years 2 months ago
Efficient Smart-Card Based Anonymous Fingerprinting
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...