Sciweavers

24188 search results - page 52 / 4838
» Computing on Encrypted Data
Sort
View
TISSEC
2010
91views more  TISSEC 2010»
14 years 8 months ago
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TODS
2010
61views more  TODS 2010»
14 years 8 months ago
Encryption policies for regulating access to outsourced data
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CRYPTO
2011
Springer
176views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
ICWN
2007
14 years 11 months ago
A New Lightweight and Scalable Encryption Algorithm for Streaming Video over Wireless Networks
Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious at...
Hao Wang, Chong-wei Xu
CCS
2006
ACM
15 years 1 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov