Sciweavers

461 search results - page 83 / 93
» Privacy Enhancing Credentials
Sort
View
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Non-interactive Timestamping in the Bounded Storage Model
A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Inte...
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
OOPSLA
2004
Springer
15 years 3 months ago
Converting Java classes to use generics
Generics offer significant software engineering benefits since they provide code reuse without compromising type safety. Thus generics will be added to the Java language in the...
Daniel von Dincklage, Amer Diwan
OOPSLA
2004
Springer
15 years 3 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 1 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
CSCW
2008
ACM
14 years 11 months ago
Supporting medical conversations between deaf and hearing individuals with tabletop displays
This paper describes the design and evaluation of Shared Speech Interface (SSI), an application for an interactive multitouch tabletop display designed to facilitate medical conve...
Anne Marie Piper, James D. Hollan