Sciweavers

24188 search results - page 31 / 4838
» Computing on Encrypted Data
Sort
View
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 4 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
ICPR
2008
IEEE
15 years 4 months ago
Topological structure-based alignment for fingerprint Fuzzy Vault
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Jianjie Li, Xin Yang, Jie Tian, Peng Shi, Peng Li
ISI
2005
Springer
15 years 3 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
DAC
2001
ACM
15 years 11 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...
IJNSEC
2008
164views more  IJNSEC 2008»
14 years 10 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau