Sciweavers

24188 search results - page 77 / 4838
» Computing on Encrypted Data
Sort
View
101
Voted
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
15 years 8 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
126
Voted
CEC
2010
IEEE
15 years 3 months ago
An analysis of clustering objectives for feature selection applied to encrypted traffic identification
This work explores the use of clustering objectives in a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, under the application...
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. ...
144
Voted
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 2 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
136
Voted
CCS
2010
ACM
15 years 2 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang