Sciweavers

1627 search results - page 305 / 326
» High Security Smartcards
Sort
View
98
Voted
TCC
2009
Springer
158views Cryptology» more  TCC 2009»
16 years 1 months ago
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
The concept of witness-hiding suggested by Feige and Shamir is a natural relaxation of zero-knowledge. In this paper we identify languages and distributions for which many known co...
Iftach Haitner, Alon Rosen, Ronen Shaltiel
104
Voted
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 1 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
16 years 29 days ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
203
Voted
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
16 years 26 days ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
114
Voted
ICSE
2005
IEEE-ACM
16 years 24 days ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball