Sciweavers

24188 search results - page 49 / 4838
» Computing on Encrypted Data
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
SIGCOMM
2010
ACM
14 years 10 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
ICDCS
2008
IEEE
15 years 4 months ago
MR-PDP: Multiple-Replica Provable Data Possession
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evide...
Reza Curtmola, Osama Khan, Randal C. Burns, Giusep...
SECURWARE
2008
IEEE
15 years 4 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
SIGMOD
2002
ACM
111views Database» more  SIGMOD 2002»
15 years 10 months ago
Executing SQL over encrypted data in the database-service-provider model
Balakrishna R. Iyer, Chen Li, Hakan Hacigüm&u...