Sciweavers

455 search results - page 63 / 91
» Differential Privacy in New Settings
Sort
View
EDBT
2008
ACM
131views Database» more  EDBT 2008»
15 years 9 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo
79
Voted
AINA
2009
IEEE
15 years 4 months ago
Enabling Mobility between Context-Aware Smart Spaces
This paper presents “ConServ1 ”, a web service for context management. ConServ allows smart spaces to access user’s context data according to user-defined policies. This we...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
PROVSEC
2007
Springer
15 years 3 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
15 years 3 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
104
Voted
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 3 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano