Sciweavers

24188 search results - page 3 / 4838
» Computing on Encrypted Data
Sort
View
ICDCS
2011
IEEE
12 years 6 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
INFOCOM
2010
IEEE
13 years 4 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
CANS
2009
Springer
153views Cryptology» more  CANS 2009»
14 years 28 days ago
Computing on Encrypted Data
Craig Gentry
STOC
2009
ACM
238views Algorithms» more  STOC 2009»
14 years 1 months ago
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in t...
Craig Gentry
CCS
2004
ACM
13 years 11 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno