Sciweavers

14 search results - page 2 / 3
» Order-Preserving Encryption for Numeric Data
Sort
View
CORR
2010
Springer
427views Education» more  CORR 2010»
13 years 2 months ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
PAISI
2010
Springer
13 years 2 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
13 years 4 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
DBSEC
2007
128views Database» more  DBSEC 2007»
13 years 6 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
ECIS
2003
13 years 5 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther