Sciweavers

35 search results - page 4 / 7
» A Structure Preserving Database Encryption Scheme
Sort
View
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
TC
2010
13 years 15 days ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 5 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...
JSW
2006
56views more  JSW 2006»
13 years 5 months ago
Evolutionary Computing for Detection of Retentive Structures in Coastal Waters
The demography of anchovy fishes in the Gulf of Biscay seems to be related to the presence of socalled "retentive" hydrodynamical structures, that keep fish eggs and larv...
Marc Segond, Denis Robilliard, Virginie Marion-Pot...
CCS
2007
ACM
13 years 12 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport