Sciweavers

234 search results - page 30 / 47
» Text Search Protocols with Simulation Based Security
Sort
View
MOBIMEDIA
2007
14 years 11 months ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 2 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
90
Voted
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind
74
Voted
ICNP
2005
IEEE
15 years 3 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...