Sciweavers

24188 search results - page 186 / 4838
» Computing on Encrypted Data
Sort
View
124
Voted
BIBE
2006
IEEE
139views Bioinformatics» more  BIBE 2006»
15 years 9 months ago
A Computational Inference Framework for analyzing Gene Regulation Pathway using Microarray Data
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
ICALP
2005
Springer
15 years 8 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
99
Voted
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 8 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
CCS
2010
ACM
15 years 7 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
DEXAW
2005
IEEE
138views Database» more  DEXAW 2005»
15 years 9 months ago
Towards a Better Integration of Data Mining and Decision Support via Computational Intelligence
Despite a high level of activity and a large number of researchers involved, current research in data mining is plagued with several serious problems that should be regarded as to...
Sylvain Delisle