Sciweavers

24188 search results - page 128 / 4838
» Computing on Encrypted Data
Sort
View
CCS
2010
ACM
15 years 3 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
ICCS
2004
Springer
15 years 8 months ago
A Dynamic Data Driven Computational Infrastructure for Reliable Computer Simulations
J. Tinsley Oden, James C. Browne, Ivo Babuska, Cha...
CIDM
2007
IEEE
15 years 3 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
15 years 9 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...