Sciweavers

8972 search results - page 54 / 1795
» Private Information Retrieval
Sort
View
WWW
2008
ACM
15 years 11 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
EUROCRYPT
2000
Springer
15 years 2 months ago
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to communicate privately. In this paper we consider in...
Ueli M. Maurer, Stefan Wolf
80
Voted
IAT
2009
IEEE
15 years 5 months ago
Creating Incentives to Prevent Intentional Execution Failures
—When information or control in a multiagent system is private to the agents, they may misreport this information or refuse to execute an agreed outcome, in order to change the r...
Yingqian Zhang, Mathijs de Weerdt
CAISE
2001
Springer
15 years 2 months ago
The P2P Approach to Interorganizational Workflows
This paper describes in an informal way the Public-To-Private (P2P) approach to interorganizational workflows, which is based on a notion of inheritance. The approach consists of t...
Wil M. P. van der Aalst, Mathias Weske
WWW
2007
ACM
15 years 11 months ago
Privacy-enhancing personalized web search
Personalized web search is a promising way to improve search quality by customizing search results for people with individual information goals. However, users are uncomfortable w...
Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen