Sciweavers

24188 search results - page 215 / 4838
» Computing on Encrypted Data
Sort
View
144
Voted
CSE
2009
IEEE
15 years 10 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
155
Voted
IACR
2011
128views more  IACR 2011»
14 years 3 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
186
Voted
EUROCRYPT
1999
Springer
15 years 7 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
59
Voted
COMPUTER
2008
65views more  COMPUTER 2008»
15 years 3 months ago
Reducing the Storage Burden via Data Deduplication
David Geer
131
Voted
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
16 years 3 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...