Sciweavers

2386 search results - page 340 / 478
» Database Security 2000
Sort
View
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 6 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
MATA
2000
Springer
15 years 6 months ago
YAAP: Yet Another Active Platform
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...
Nicolas Rouhana, Samer Boustany, Eric Horlait
PKC
2000
Springer
107views Cryptology» more  PKC 2000»
15 years 6 months ago
Some Remarks on a Fair Exchange Protocol
Fair exchange turns out to be an increasingly importanttopic due to the rapid growth of electronic commerce. An exchange is deemed to be fair if at the end of exchange, either each...
Jianying Zhou, Robert H. Deng, Feng Bao
130
Voted
TSDM
2000
151views Data Mining» more  TSDM 2000»
15 years 6 months ago
Identifying Temporal Patterns for Characterization and Prediction of Financial Time Series Events
The novel Time Series Data Mining (TSDM) framework is applied to analyzing financial time series. The TSDM framework adapts and innovates data mining concepts to analyzing time ser...
Richard J. Povinelli
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 6 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky