Sciweavers

24188 search results - page 77 / 4838
» Computing on Encrypted Data
Sort
View
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
15 years 3 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
CEC
2010
IEEE
14 years 11 months ago
An analysis of clustering objectives for feature selection applied to encrypted traffic identification
This work explores the use of clustering objectives in a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, under the application...
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. ...
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
14 years 10 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
CCS
2010
ACM
14 years 10 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang