Sciweavers

2715 search results - page 439 / 543
» Database Publication Practices
Sort
View
CCS
2008
ACM
15 years 6 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
CSCW
2008
ACM
15 years 6 months ago
Understanding collective play in an urban screen game
In recent years there has been a growing interest in urban screen applications. While there have been several deployments of these technologies in our urban environments, surprisi...
Kenton O'Hara, Maxine Glancy, Simon Robertshaw
EUROCRYPT
2008
Springer
15 years 6 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
DAGSTUHL
2007
15 years 6 months ago
What is Input/Output Logic? Input/Output Logic, Constraints, Permissions
We explain the raison d’ˆetre and basic ideas of input/output logic, sketching the central elements with pointers to other publications for detailed developments. The motivation...
David Makinson, Leendert W. N. van der Torre
COMMA
2006
15 years 6 months ago
CBR and Argument Schemes for Collaborative Decision Making
In this paper we present a novel approach for combining Case-Based Reasoning (CBR) and Argumentation. This approach involves 1) the use of CBR for evaluating the arguments submitt...
Pancho Tolchinsky, Sanjay Modgil, Ulises Cort&eacu...