Sciweavers

1296 search results - page 92 / 260
» Multiplicative Background Risk
Sort
View
CIKM
2007
Springer
15 years 10 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
135
Voted
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal
140
Voted
ESAS
2005
Springer
15 years 9 months ago
Spontaneous Cooperation in Multi-domain Sensor Networks
Sensor networks are large scale networks consisting of several nodes and some base stations. The nodes are monitoring the environment and send their measurement data towards the ba...
Levente Buttyán, Tamás Holczer, P&ea...
SPAA
2010
ACM
15 years 9 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
NDSS
2000
IEEE
15 years 8 months ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...