Sciweavers

169 search results - page 16 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
126
Voted
TAMC
2009
Springer
15 years 11 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
169
Voted
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 10 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher
MIDDLEWARE
2010
Springer
15 years 3 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
PET
2009
Springer
15 years 11 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...