Sciweavers

24188 search results - page 27 / 4838
» Computing on Encrypted Data
Sort
View
ACMSE
2004
ACM
15 years 3 months ago
Implementing the TEA algorithm on sensors
Sensors are tiny computers with limited computational capability and physical resources. The implementation of secure protocols for sensor network is a big challenge. In order to ...
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradfor...
SDMW
2010
Springer
14 years 7 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets
A lightweight encryption technique for JPEG2000 with optional support for transparent encryption is proposed. Randomized anisotropic wavelet packet bases are used to construct a s...
Dominik Engel, Andreas Uhl
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
SASO
2008
IEEE
15 years 4 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...