Sciweavers

24188 search results - page 48 / 4838
» Computing on Encrypted Data
Sort
View
SIS
2004
14 years 11 months ago
Efficient Tree Search in Encrypted Data
Abstract. Sometimes there is a need to store sensitive data on an untrusted database server. Song, Wagner and Perrig have introduced a way to search for the existence of a word in ...
Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter...
ACNS
2004
Springer
220views Cryptology» more  ACNS 2004»
15 years 3 months ago
Secure Conjunctive Keyword Search over Encrypted Data
Abstract. We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterio...
Philippe Golle, Jessica Staddon, Brent R. Waters
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
15 years 4 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
TAMC
2009
Springer
15 years 4 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
15 years 4 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...