Sciweavers

24188 search results - page 129 / 4838
» Computing on Encrypted Data
Sort
View
SSD
2009
Springer
193views Database» more  SSD 2009»
15 years 9 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
ITCC
2005
IEEE
15 years 8 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis
WETICE
2007
IEEE
15 years 9 months ago
Managing Confidential Data in the gLite Middleware
How to manage confidential data in the grid environment is a critical issue because users’ data can be saved in untrusted remote storages. This paper introduces a service to sto...
Diego Scardaci, Giordano Scuderi
ESORICS
2009
Springer
16 years 3 months ago
Keep a Few: Outsourcing Data While Maintaining Confidentiality
We put forward a novel paradigm for preserving privacy in data outsourcing which departs from encryption. The basic idea behind our proposal is to involve the owner in storing a li...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
ICMCS
2006
IEEE
110views Multimedia» more  ICMCS 2006»
15 years 9 months ago
A Video Scrambling Scheme Applicable to Local Region without Data Expansion
Recently, several scrambling techniques have been proposed for video digitally archived. These methods realize efficient processing by partial encryption on MPEG compressed data ...
Makoto Takayama, Kiyoshi Tanaka, Akio Yoneyama, Ya...