Sciweavers

24188 search results - page 3 / 4838
» Computing on Encrypted Data
Sort
View
146
Voted
ICDCS
2011
IEEE
14 years 22 days ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
166
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
99
Voted
CANS
2009
Springer
153views Cryptology» more  CANS 2009»
15 years 7 months ago
Computing on Encrypted Data
Craig Gentry
123
Voted
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
15 years 8 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
96
Voted
CCS
2004
ACM
15 years 6 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno