Sciweavers

1018 search results - page 93 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 11 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
FC
2009
Springer
67views Cryptology» more  FC 2009»
15 years 8 months ago
Privacy-Preserving Classifier Learning
We present an efficient protocol for the privacy-preserving, distributed learning of decision-tree classifiers. Our protocol allows a user to construct a classifier on a database h...
Justin Brickell, Vitaly Shmatikov
DGO
2003
97views Education» more  DGO 2003»
15 years 6 months ago
Designing a Metadata -Driven Visual Information Browser for Federal Statistics
When looking for federal statistics, finding the right table, chart or report can be a daunting task for anyone not thoroughly familiar with the federal statistical system. Search...
Bill Kules, Ben Shneiderman
WPES
2003
ACM
15 years 10 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
IPSN
2010
Springer
15 years 6 months ago
Information processing for live photo mosaic with a group of wireless image sensors
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allo...
Fulu Li, James Barabas, Ana L. Santos