Sciweavers

446 search results - page 68 / 90
» On Anonymity of Group Signatures
Sort
View
EUROCRYPT
1999
Springer
15 years 4 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
EDBT
2008
ACM
146views Database» more  EDBT 2008»
15 years 12 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
GROUP
2009
ACM
15 years 6 months ago
Two peers are better than one: aggregating peer reviews for computing assignments is surprisingly accurate
Scientific peer review, open source software development, wikis, and other domains use distributed review to improve quality of created content by providing feedback to the workā...
Ken Reily, Pam Ludford Finnerty, Loren G. Terveen
JSAC
2007
224views more  JSAC 2007»
14 years 11 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
112
Voted
GIS
2010
ACM
14 years 9 months ago
Spatiotemporal summarization of traffic data streams
With resource-efficient summarization and accurate reconstruction of the historic traffic sensor data, one can effectively manage and optimize transportation systems (e.g., road n...
Bei Pan, Ugur Demiryurek, Farnoush Banaei Kashani,...