Sciweavers

24188 search results - page 144 / 4838
» Computing on Encrypted Data
Sort
View
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
15 years 6 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
CSREASAM
2006
15 years 4 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett
SAJ
2002
97views more  SAJ 2002»
15 years 2 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 3 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 9 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...