Sciweavers

24188 search results - page 52 / 4838
» Computing on Encrypted Data
Sort
View
TISSEC
2010
91views more  TISSEC 2010»
14 years 10 months ago
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani, Sabrina De Capitani di Vimercat...
TODS
2010
61views more  TODS 2010»
14 years 10 months ago
Encryption policies for regulating access to outsourced data
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CRYPTO
2011
Springer
176views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
ICWN
2007
15 years 1 months ago
A New Lightweight and Scalable Encryption Algorithm for Streaming Video over Wireless Networks
Wireless networks are poised to enable a variety of existing and emerging video streaming applications. However, video streaming over wireless suffers from piracy and malicious at...
Hao Wang, Chong-wei Xu
CCS
2006
ACM
15 years 3 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov