1

Homogenization of Two-Dimensional Linear Flows with Integral Invariance

Year:
1997
Language:
english
File:
PDF, 1.32 MB
english, 1997
3

Secure distributed computation of anonymized views of shared databases

Year:
2012
Language:
english
File:
PDF, 2.18 MB
english, 2012
4

Homogenization of Two-Dimensional Linear Flows with Integral Invariance

Year:
1997
Language:
english
File:
PDF, 530 KB
english, 1997
5

Oblivious evaluation of multivariate polynomials

Year:
2013
Language:
english
File:
PDF, 307 KB
english, 2013
6

Individual privacy in social influence networks

Year:
2016
Language:
english
File:
PDF, 868 KB
english, 2016
8

The Convergence Rate of Godunov Type Schemes

Year:
1994
Language:
english
File:
PDF, 369 KB
english, 1994
10

Constrained obfuscation of relational databases

Year:
2014
Language:
english
File:
PDF, 1.71 MB
english, 2014
12

Hierarchical Threshold Secret Sharing

Year:
2007
Language:
english
File:
PDF, 338 KB
english, 2007
14

Vector assignment schemes for asymmetric settings

Year:
2006
Language:
english
File:
PDF, 261 KB
english, 2006
15

A practical approximation algorithm for optimalk-anonymity

Year:
2012
Language:
english
File:
PDF, 912 KB
english, 2012
19

Optimal preemptive scheduling for general target functions

Year:
2006
Language:
english
File:
PDF, 1.35 MB
english, 2006
22

The Convergence Rate of Godunov Type Schemes

Year:
1994
Language:
english
File:
PDF, 1.47 MB
english, 1994
24

Approximation schemes for the Min-Max Starting Time Problem

Year:
2004
Language:
english
File:
PDF, 193 KB
english, 2004
25

Finding all maximally-matchable edges in a bipartite graph

Year:
2012
Language:
english
File:
PDF, 259 KB
english, 2012
27

Low Bandwidth Dynamic Traitor Tracing Schemes

Year:
2005
Language:
english
File:
PDF, 222 KB
english, 2005
30

Vector assignment problems: a general framework

Year:
2003
Language:
english
File:
PDF, 206 KB
english, 2003
31

A hierarchical clustering algorithm based on the Hungarian method

Year:
2008
Language:
english
File:
PDF, 345 KB
english, 2008
32

On proper secrets, (t,k)-bases and linear codes

Year:
2009
Language:
english
File:
PDF, 338 KB
english, 2009
34

Dynamic Traitor Tracing

Year:
2001
Language:
english
File:
PDF, 73 KB
english, 2001
35

Improved versions of Tardos’ fingerprinting scheme

Year:
2008
Language:
english
File:
PDF, 408 KB
english, 2008
36

Identity obfuscation in graphs through the information theoretic lens

Year:
2014
Language:
english
File:
PDF, 3.61 MB
english, 2014
41

Characterizing Ideal Weighted Threshold Secret Sharing

Year:
2008
Language:
english
File:
PDF, 414 KB
english, 2008
44

Multipartite Secret Sharing by Bivariate Interpolation

Year:
2009
Language:
english
File:
PDF, 559 KB
english, 2009
45

Generalized oblivious transfer by secret sharing

Year:
2011
Language:
english
File:
PDF, 162 KB
english, 2011
47

Privacy by diversity in sequential releases of databases

Year:
2015
Language:
english
File:
PDF, 1.35 MB
english, 2015