Sciweavers

2386 search results - page 184 / 478
» Database Security 2000
Sort
View
ASIACRYPT
2000
Springer
15 years 2 months ago
A Length-Invariant Hybrid Mix
This paper presents a secure and flexible Mix-net that has the following properties; it efficiently handles long plaintexts that exceed the modulus size of underlying public-key e...
Miyako Ohkubo, Masayuki Abe
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 2 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...
DIAU
2000
Springer
15 years 2 months ago
Protection Profiles for Remailer Mixes
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main rea...
Giovanni Iachello, Kai Rannenberg
OOPSLA
2000
Springer
15 years 2 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
EDBT
2010
ACM
181views Database» more  EDBT 2010»
14 years 9 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...