Sciweavers

1906 search results - page 145 / 382
» Data Privacy
Sort
View
128
Voted
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 7 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
136
Voted
ESORICS
2012
Springer
13 years 5 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
122
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Scopira: an open source C++ framework for biomedical data analysis applications -- a research project report
In MRI research labs, algorithms are typically implemented in MATLAB or IDL. If performance is an issue they are ported to C and integrated with interpreted systems, not fully uti...
Aleksander B. Demko, Rodrigo A. Vivanco, Nicolino ...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
15 years 1 months ago
Trust-Based Data Disclosure in Sensor Networks
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
Efthimia Aivaloglou, Stefanos Gritzalis
WIOPT
2005
IEEE
15 years 9 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff