Sciweavers

3395 search results - page 120 / 679
» Computational Differential Privacy
Sort
View
91
Voted
TEC
2011
134views more  TEC 2011»
14 years 7 months ago
Differential Evolution: A Survey of the State-of-the-Art
—Differential evolution (DE) is arguably one of the most powerful stochastic real-parameter optimization algorithms in current use. DE operates through similar computational step...
Swagatam Das, Ponnuthurai Nagaratnam Suganthan
119
Voted
JDCTA
2010
175views more  JDCTA 2010»
14 years 7 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
CCS
2006
ACM
15 years 4 months ago
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite advances in fault tolerance
Claude Castelluccia, Einar Mykletun, Gene Tsudik
66
Voted
CHI
2005
ACM
16 years 1 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
95
Voted
SDMW
2004
Springer
15 years 6 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan