Sciweavers

1005 search results - page 131 / 201
» Practical Secure Function Evaluation
Sort
View
SMC
2010
IEEE
117views Control Systems» more  SMC 2010»
14 years 11 months ago
A simulation modelling approach enabling joint emergency response operations
—A novel capability for modelling and simulating intra- and inter-organizational collaboration in an emergencyresponse domain is presented. This capability combines the prescript...
Nicola Bicocchi, William Ross, Mihaela Ulieru
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
15 years 4 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
94
Voted
SOUPS
2009
ACM
15 years 7 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
116
Voted
DLOG
2004
15 years 2 months ago
Extended Query Facilities for Racer and an Application to Software-Engineering Problems
er reports on a pragmatic query language for Racer. The abstract syntax and semantics of this query language is defined. Next, the practical relevance of this query language is sh...
Volker Haarslev, Ralf Möller, Ragnhild Van De...
95
Voted
ACSAC
2009
IEEE
15 years 7 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans