Sciweavers

3299 search results - page 123 / 660
» Privacy and Trusted Computing
Sort
View
86
Voted
COMPUTER
2000
75views more  COMPUTER 2000»
15 years 4 months ago
Can You Trust Software Capability Evaluations?
Emilie O'Connell, Hossein Saiedian
COMPUTER
1998
50views more  COMPUTER 1998»
15 years 4 months ago
Providing Trusted Components to the Industry
Bertrand Meyer, Christine Mingins, Heinz W. Schmid...
164
Voted
ICISC
2007
134views Cryptology» more  ICISC 2007»
15 years 6 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Computational Differential Privacy
Ilya Mironov, Omkant Pandey, Omer Reingold, Salil ...