Sciweavers

39 search results - page 6 / 8
» Authorized Private Keyword Search over Encrypted Data in Clo...
Sort
View
ACMSE
2009
ACM
13 years 3 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
OZCHI
2006
ACM
13 years 11 months ago
A wearable folding display for self-expression
This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic...
Andrew Vande Moere, Monika Hoinkis
ERCIMDL
2009
Springer
115views Education» more  ERCIMDL 2009»
14 years 10 days ago
Using Semantic Technologies in Digital Libraries - A Roadmap to Quality Evaluation
In digital libraries semantic techniques are often deployed to reduce the expensive manual overhead for indexing documents, maintaining metadata, or caching for future search. Howe...
Sascha Tönnies, Wolf-Tilo Balke
SAC
2006
ACM
13 years 11 months ago
Automatic structured query transformation over distributed digital libraries
Structured data and complex schemas are becoming the main way to represent the information many Digital Libraries provide, thus impacting the services they offer. When searching i...
M. Elena Renda, Umberto Straccia
CCS
2008
ACM
13 years 6 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar