Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for ...
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. ...
In this paper, we describe how to automate the process of subscribing to complex publish-subscribe systems. We present a proof-of-concept prototype, in which we analyze Web browsi...
Lars Brenna, Cathal Gurrin, Dag Johansen, Dmitrii ...
This paper analyses different protocols of session guarantees. Session guarantees (also known as client-centric consistency models) are one of the class of consistency models of r...
Anna Kobusinska, Cezary Sobaniec, Marek Libuda, Da...
A processor’s energy consumption can be reduced by compressing values (data and addresses) that flow through a processor pipeline and gating off portions of data path elements th...
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...