Sciweavers

6431 search results - page 1106 / 1287
» Model Building by Resolution
Sort
View
122
Voted
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 8 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ER
2003
Springer
144views Database» more  ER 2003»
15 years 8 months ago
A Framework for Business Rule Driven Web Service Composition
With web services emerging as a promising technology for supporting open and dynamic business processes, it is witnessed that standards for business process specification in the c...
Bart Orriëns, Jian Yang, Mike P. Papazoglou
147
Voted
INDOCRYPT
2003
Springer
15 years 8 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ISI
2003
Springer
15 years 8 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
117
Voted
SSDBM
2010
IEEE
105views Database» more  SSDBM 2010»
15 years 8 months ago
Organization of Data in Non-convex Spatial Domains
We present a technique for organizing data in spatial databases with non-convex domains based on an automatic characterization using the medial-axis transform (MAT). We define a t...
Eric A. Perlman, Randal C. Burns, Michael M. Kazhd...
« Prev « First page 1106 / 1287 Last » Next »