Sciweavers

3395 search results - page 115 / 679
» Computational Differential Privacy
Sort
View
91
Voted
SIP
2003
14 years 11 months ago
Design of Full Band IIR Digital Differentiators
This paper presents an efficient method for designing full band IIR digital differentiators in the complex Chebyshev sense. The proposed method is based on the formulation of a g...
Xi Zhang, Toshinori Yoshikawa
81
Voted
CSL
2010
Springer
14 years 11 months ago
Quantified Differential Dynamic Logic for Distributed Hybrid Systems
Abstract. We address a fundamental mismatch between the combinations of dynamics that occur in complex physical systems and the limited kinds of dynamics supported in analysis. Mod...
André Platzer
SAC
2010
ACM
15 years 5 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
79
Voted
IJNSEC
2008
145views more  IJNSEC 2008»
14 years 10 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
102
Voted
PET
2012
Springer
13 years 21 days ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter