Sciweavers

24529 search results - page 275 / 4906
» Computing on Authenticated Data
Sort
View
136
Voted
ESORICS
2010
Springer
15 years 4 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
129
Voted
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 3 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
166
Voted
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 10 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
ICPR
2002
IEEE
15 years 8 months ago
High-Resolution Reconstruction of Sparse Data from Dense Low-Resolution Spatio-Temporal Data
Abstract—A novel approach for reconstruction of sparse highresolution data from lower-resolution dense spatio-temporal data is introduced. The basic idea is to compute the dense ...
Qing Yang, Bahram Parvin
106
Voted
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
16 years 29 days ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han