Sciweavers

5255 search results - page 173 / 1051
» Formal Methods for Privacy
Sort
View
117
Voted
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 9 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
198
Voted
SSD
1993
Springer
237views Database» more  SSD 1993»
15 years 7 months ago
A Small Set of Formal Topological Relationships Suitable for End-User Interaction
Topological relationships between spatial objects represent important knowledge that users of geographic information systems expect to retrieve from a spatial database. A di cult t...
Eliseo Clementini, Paolino Di Felice, Peter van Oo...
127
Voted
FAABS
2004
Springer
15 years 7 months ago
Formal Consistency Verification of Deliberative Agents with Respect to Communication Protocols
The aim of this paper is to show a method that is able to detect inconsistencies in the reasoning carried out by a deliberative agent. The agent is supposed to be provided with a h...
Jaime Ramírez, Angélica de Antonio
156
Voted
PERCOM
2007
ACM
16 years 3 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
114
Voted
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
15 years 9 months ago
People Identification with Limited Labels in Privacy-Protected Video
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Yi Chang, Rong Yan, Datong Chen, Jie Yang