Sciweavers

Share
5119 search results - page 1024 / 1024
» Security Privacy
Sort
View
SAC
2010
ACM
10 years 1 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database speci´Čücally built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
IHI
2010
197views Healthcare» more  IHI 2010»
9 years 9 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
8 years 10 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
EUROCRYPT
2012
Springer
8 years 5 months ago
Malleable Proof Systems and Applications
sion of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report 2012/012. Malleability ...
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya...
« Prev « First page 1024 / 1024 Last » Next »
books