Sciweavers

10670 search results - page 124 / 2134
» Required Information Release
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
IWPSE
2003
IEEE
15 years 7 months ago
The Chaos of Software Development
In this paper we present a new perspective on the problem of complexity in software, using sound mathematical concepts from information theory such as Shannon’s Entropy [31]. We...
Ahmed E. Hassan, Richard C. Holt
ASIACRYPT
2000
Springer
15 years 5 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
INFOCOM
1995
IEEE
15 years 5 months ago
Address Management and Connection Control for Multicast Communication Applications
An architecture and associated protocols are presented for managing multicast addresses and performing connection control for applications that use multicast communication faciliti...
Alexandros Eleftheriadis, Sassan Pejhan, Dimitris ...
LREC
2010
138views Education» more  LREC 2010»
15 years 3 months ago
BAStat : New Statistical Resources at the Bavarian Archive for Speech Signals
A new type of language resource 'BAStat' has been released by the Bavarian Archive for Speech Signals. In contrast to primary resources like speech and text corpora BASt...
Florian Schiel