Sciweavers

Share
17 search results - page 1 / 4
» New Approaches for Secure Outsourcing Algorithm for Modular ...
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
11 years 5 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security deļ¬nition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
WISA
2005
Springer
11 years 5 months ago
DPA Attack on the Improved Ha-Moon Algorithm
Abstract. The algorithm proposed by Ha and Moon [2] is a countermeasure against power analysis. The Ha-Moon algorithm has two drawbacks in that it requires an inversion and has a r...
Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
SSD
2009
Springer
193views Database» more  SSD 2009»
11 years 6 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
JUCS
2010
124views more  JUCS 2010»
10 years 10 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
11 years 3 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
books