Sciweavers

455 search results - page 45 / 91
» Differential Privacy in New Settings
Sort
View
TVCG
2012
196views Hardware» more  TVCG 2012»
13 years 3 days ago
Robust Morse Decompositions of Piecewise Constant Vector Fields
—In this paper, we introduce a new approach to computing a Morse decomposition of a vector field on a triangulated manifold surface. The basic idea is to convert the input vector...
Andrzej Szymczak, Eugene Zhang
86
Voted
CCS
2006
ACM
15 years 1 months ago
An efficient key establishment scheme for secure aggregating sensor networks
Key establishment is a fundamental prerequisite for secure communication in wireless sensor networks. A new node joining the network needs to efficiently and autonomously set up s...
Erik-Oliver Blaß, Martina Zitterbart
CCS
2006
ACM
15 years 1 months ago
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search...
Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail ...
COMPCON
1995
IEEE
15 years 1 months ago
NetBill: An Internet Commerce System Optimized for Network Delivered Services
Netbill is a business model, set of protocols, and software implementation for commerce in information goods and other network delivered services. It has very low transaction cost...
Marvin A. Sirbu, J. D. Tygar
CIIT
2007
131views Communications» more  CIIT 2007»
14 years 11 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas