Sciweavers

3047 search results - page 99 / 610
» A Secure Distributed Search System
Sort
View
AINA
2009
IEEE
15 years 8 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
IPPS
2005
IEEE
15 years 8 months ago
A Category Overlay Infrastructure for Peer-to-Peer Content Search
For a Peer-to-Peer (P2P) system which contains huge amount of data, an efficient content search technique is definitely necessary. In this paper, we present a novel category overl...
Xin Liu, Jun Wang, Son T. Vuong
CCGRID
2006
IEEE
15 years 6 months ago
Density-Based Clustering for Similarity Search in a P2P Network
P2P systems represent a large portion of the Internet traffic which makes the data discovery of great importance to the user and the broad Internet community. Hence, the power of ...
Mouna Kacimi, Kokou Yétongnon
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 9 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
117
Voted
CCS
2007
ACM
15 years 9 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...