Sciweavers

24188 search results - page 18 / 4838
» Computing on Encrypted Data
Sort
View
CSR
2008
Springer
14 years 11 months ago
Public Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computat...
Denis Osin, Vladimir Shpilrain
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
15 years 11 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
AISS
2010
119views more  AISS 2010»
14 years 7 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
COMPSEC
1998
102views more  COMPSEC 1998»
14 years 9 months ago
Reversible data mixing procedure for efficient public-key encryption
This paper describes a data mixing method for encrypting a plaintext block using a block encryption algorithm (such as Elliptic Curve, RSA, etc.) having a block size smaller than ...
Mike Matyas, Mohammad Peyravian, Allen Roginsky, N...
DBSEC
2006
134views Database» more  DBSEC 2006»
14 years 11 months ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik