Sciweavers

100 search results - page 12 / 20
» Cryptographic measures in information hiding
Sort
View
ICDCS
2011
IEEE
13 years 9 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
EUROSYS
2011
ACM
14 years 1 months ago
Database engines on multicores, why parallelize when you can distribute?
Multicore computers pose a substantial challenge to infrastructure software such as operating systems or databases. Such software typically evolves slower than the underlying hard...
Tudor-Ioan Salomie, Ionut Emanuel Subasu, Jana Gic...
ACSAC
2003
IEEE
15 years 1 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
SAC
2006
ACM
15 years 3 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
IUI
1997
ACM
15 years 1 months ago
Evaluating the Utility and Usability of an Adaptive Hypermedia System
We have evaluated an adaptive hypermedia system, PUSH, and compared it to a non-adaptive variant of the same system. Based on an inferred information-seeking task, PUSH chooses wh...
Kristina Höök