Sciweavers

24188 search results - page 49 / 4838
» Computing on Encrypted Data
Sort
View
107
Voted
ESORICS
2004
Springer
15 years 8 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
100
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
117
Voted
ICDCS
2008
IEEE
15 years 9 months ago
MR-PDP: Multiple-Replica Provable Data Possession
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evide...
Reza Curtmola, Osama Khan, Randal C. Burns, Giusep...
119
Voted
SECURWARE
2008
IEEE
15 years 9 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
84
Voted
SIGMOD
2002
ACM
111views Database» more  SIGMOD 2002»
16 years 2 months ago
Executing SQL over encrypted data in the database-service-provider model
Balakrishna R. Iyer, Chen Li, Hakan Hacigüm&u...