搜索结果: 1-15 共查到“membership”相关记录51条 . 查询时间(0.103 秒)
Membership Privacy for Fully Dynamic Group Signatures
SFPK SPSEQ
font style='font-size:12px;'>
2018/7/9
Group signatures present a trade-off between the traditional goals of digital signatures and the signer's desire for privacy, allowing for the creation of unforgeable signatures in the name of a group...
Universally Composable Zero-Knowledge Proof of Membership
UC zero-knowledge
font style='font-size:12px;'>
2017/4/27
Since its introduction the UC framework by Canetti has received a lot of attention. A contributing factor to its popularity is that it allows to capture a large number of common cryptographic primitiv...
Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs
Caching Strategies Secure (Non-)Membership Proofs
font style='font-size:12px;'>
2016/7/13
A sparse Merkle tree is an authenticated data structure based on a perfect Merkle tree of intractable size. It contains a distinct leaf for every possible output from a cryptographic hash function, an...
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
membership encryption priced oblivious transfer universally composable security
font style='font-size:12px;'>
2016/1/8
Membership encryption is a newly developed cryptographic primitive that combines
membership proof and encryption into an unified setting. This paper presents a new flexible membership
encryption sch...
Primary-Secondary-Resolver Membership Proof Systems
Zero-Knowledge Efficiency DNSSEC
font style='font-size:12px;'>
2016/1/6
We consider Primary-Secondary-Resolver Membership Proof Systems (PSR for short) and
show different constructions of that primitive. A PSR system is a 3-party protocol, where we have a
primary, which...
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Zero Knowledge Witness Elimination Smooth Projective Hash Function
font style='font-size:12px;'>
2016/1/4
Often, in privacy-sensitive cryptographic protocols, a party commits to a secret message m and later needs to prove
that m belongs to a language L or that m does not belong to L (but does not want to...
Set-membership identification of systems with parametric and nonparametric uncertainty
Parameters parameter estimation system model the parameter uncertainty
font style='font-size:12px;'>
2015/8/12
A method is presented for parameter set estimation where the system model is assumed to contain both parametric and nonparametric uncertainty. In the disturbance-free case, the parameter set estimate ...
Function-Private Subspace-Membership Encryption and Its Applications
Function privacy functional encryption
font style='font-size:12px;'>
2015/8/5
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy i...
Executive Compensation In Entrepreneurial Teams:The Founder Gap,Board Membership,& Pay For Milestones
Management Compensation and Benefits Groups and Teams Governance
font style='font-size:12px;'>
2015/5/14
This study examines executive compensation in entrepreneurial teams, using a dataset of 529 private companies (1,218 CEOs, CFOs, and CTOs) from 2000, 2001, and 2002. Founders make less than non-founde...
URBAN LAND USE CLASSES WITH FUZZY MEMBERSHIP AND CLASSIFICATION BASED ON INTEGRATION OF REMOTE SENSING AND GIS
Land Use Classification Fuzzy Modeling Image Analysis GIS
font style='font-size:12px;'>
2015/2/5
Urban land use classification from remotely sensed images has drawn great attention in the past decades. Most
researchers derive land use data from remotely sensed images alone, but the results are ...
Survey of Cancer Care Coordinators within the COSA membership
COSA membership Cancer Care Coordinators
font style='font-size:12px;'>
2015/1/23
The Clinical Oncological Society of Australia (COSA) is Australia’s peak multidisciplinary society for
health professionals working in cancer research, treatment, rehabilitation or palliative care. ...
Function-Private Subspace-Membership Encryption and Its Applications
Function privacy functional encryption
font style='font-size:12px;'>
2014/3/12
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy i...
Trade Union Membership and Sickness Absence: Evidence from a Sick Pay Reform
difference-in-differences sickness-related absence Socio-Economic Panel (SOEP) statutory sick pay trade union membership
font style='font-size:12px;'>
2012/10/23
In 1996, statutory sick pay was reduced for private sector workers in Germany. Using the empirical observation that trade union members are dismissed less often than non-members, we construct a model ...
Union Membership and Density: Some (Not So) Stylized Facts and Challenges
trade unions union membership union density unionization
font style='font-size:12px;'>
2012/10/22
Surveying some recent data and the empirical literature from various disciplines, this paper attempts to shed some light on what we know and don't know about (trends in) unionization and its determina...
Multidimensional Membership Mixture Models
Multidimensional Membership Mixture Models
font style='font-size:12px;'>
2012/9/18
We present the multidimensional membership mixture (M3) models where every dimension of the membership represents an independent mixture model and each
data point is generated from the selected mixtu...