Sciweavers

24188 search results - page 254 / 4838
» Computing on Encrypted Data
Sort
View
151
Voted
CONCURRENCY
2002
99views more  CONCURRENCY 2002»
15 years 3 months ago
A distributed computing environment for interdisciplinary applications
Practical applications are generally interdisciplinary in nature. The technology is well matured for addressing individual discipline applications and not for interdisciplinary ap...
Jerry A. Clarke, Raju R. Namburu
115
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
124
Voted
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
15 years 9 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
194
Voted
ISPEC
2011
Springer
14 years 6 months ago
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
The AES block cipher has a 128-bit block length and a user key of 128, 192 or 256 bits, released by NIST for data encryption in the USA; it became an ISO international standard in ...
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
111
Voted
BRAIN
2009
Springer
15 years 10 months ago
Data Explosion, Data Nature and Dataology
The essence of computer applications is to store things in the real world into computer systems in the form of data, i.e., it is a process of producing data. Some data are the reco...
Yangyong Zhu, Ning Zhong, Yun Xiong