Sciweavers

770 search results - page 112 / 154
» Privacy Preserving Joins
Sort
View
CTRSA
2007
Springer
102views Cryptology» more  CTRSA 2007»
15 years 3 months ago
Improved Efficiency for Private Stable Matching
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage). We show that the communication complexity...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
ECTEL
2006
Springer
15 years 3 months ago
Socially-Aware Informal Learning Support: Potentials and Challenges of the Social Dimension
With increasingly conceiving learning as a social activity, technological support must become more aware of the social context of the individual in order to be able to provide adeq...
Simone Braun, Andreas Schmidt
GEOINFO
2007
15 years 1 months ago
Trajectory Data Warehouses: Proposal of Design and Application to Exploit Data
In this paper we are interested in storing and perform OLAP queries about various aggregate trajectory properties. We consider a data stream environment where a set of mobile objec...
Fernando J. Braz
IJIT
2004
15 years 1 months ago
Practical Fair Anonymous Undeniable Signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also trac...
Song Han, Elizabeth Chang, Xiaotie Deng, Winson K....
CORR
2010
Springer
164views Education» more  CORR 2010»
14 years 12 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy