Sciweavers

446 search results - page 65 / 90
» On Anonymity of Group Signatures
Sort
View
NAR
1998
101views more  NAR 1998»
14 years 11 months ago
The PRINTS protein fingerprint database in its fifth year
PRINTS is a database of protein family ‘fingerprints’ offering a diagnostic resource for newly-determined sequences. By contrast with PROSITE, which uses single consensus expr...
Terri K. Attwood, Michael E. Beck, Darren R. Flowe...
ISAAC
1994
Springer
91views Algorithms» more  ISAAC 1994»
15 years 3 months ago
A New Problem in String Searching
We describe a substring search problem that arises in group presentation simplification processes. We suggest a two-level searching model: skip and match levels. We give two timest...
George Havas, Jin Xian Lian
IJNSEC
2006
56views more  IJNSEC 2006»
14 years 11 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams
AC
2000
Springer
14 years 11 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 1 days ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton