Sciweavers

3349 search results - page 114 / 670
» Data Security
Sort
View
115
Voted
JCDL
2003
ACM
103views Education» more  JCDL 2003»
15 years 8 months ago
SCENS: A System for the Mediated Sharing of Sensitive Data
1 This paper introduces SCENS, a Secure Content Exchange Negotiation System suitable for the exchange of private digital data that reside in distributed digital repositories. SCENS...
Song Ye, Fillia Makedon, Tilmann Steinberg, Li She...
150
Voted
AISADM
2005
Springer
15 years 9 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
CSFW
2007
IEEE
15 years 9 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle
132
Voted
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 9 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 3 months ago
Generalized Secure Distributed Source Coding with Side Information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...