Sciweavers

1464 search results - page 37 / 293
» On optimal anonymization for l -diversity
Sort
View
ISW
2005
Springer
15 years 5 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
CGA
2006
14 years 12 months ago
Declarative Optimization-Based Drama Management in Interactive Fiction
takes place in an abstract model, connected to therealgamebypassingmessagesbackandforth,asFigure2illustrates.ThegametellstheDMwhenplotpoints occur, and the DM tells the game when i...
Mark J. Nelson, Michael Mateas, David L. Roberts, ...
ISAAC
2004
Springer
102views Algorithms» more  ISAAC 2004»
15 years 5 months ago
Polynomial Deterministic Rendezvous in Arbitrary Graphs
Abstract. The rendezvous problem in graphs has been extensively studied in the literature, mainly using a randomized approach. Two mobile agents have to meet at some node of a conn...
Dariusz R. Kowalski, Andrzej Pelc
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 6 months ago
Minimality Attack in Privacy Preserving Data Publishing
Data publishing generates much concern over the protection of individual privacy. In the well-known kanonymity model and the related models such as l-diversity and (α, k)-anonymi...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, J...