214
Voted
PET
13 years 2 months ago
2012 Springer
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
156
click to vote
PET
13 years 2 months ago
2012 Springer
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
127
click to vote
PET
13 years 2 months ago
2012 Springer
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
131
click to vote
PET
13 years 2 months ago
2012 Springer
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
124
Voted
PET
13 years 2 months ago
2012 Springer
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxi...
|