The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
In MRI research labs, algorithms are typically implemented in MATLAB or IDL. If performance is an issue they are ported to C and integrated with interpreted systems, not fully uti...
Aleksander B. Demko, Rodrigo A. Vivanco, Nicolino ...
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...