Sciweavers

24188 search results - page 74 / 4838
» Computing on Encrypted Data
Sort
View
MOBIHOC
2006
ACM
15 years 9 months ago
Jamming and sensing of encrypted wireless ad hoc networks
Timothy X. Brown, Jesse E. James, Amita Sethi
ESORICS
2011
Springer
13 years 9 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...
ANSS
2008
IEEE
15 years 4 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
ESORICS
2007
Springer
15 years 4 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 4 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...