Sciweavers

1640 search results - page 116 / 328
» Deriving Private Information from Randomized Data
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 1 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
INFOCOM
2011
IEEE
14 years 1 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
15 years 4 months ago
Predicting Protective Linear B-Cell Epitopes Using Evolutionary Information
Mapping B-cell epitopes plays an important role in vaccine design, immunodiagnostic tests, and antibody production. Because the experimental determination of B-cell epitopes is ti...
Yasser El-Manzalawy, Drena Dobbs, Vasant Honavar
ESORICS
2011
Springer
13 years 9 months ago
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
Abstract. Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The privacy of users’ acces...
Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
PET
2010
Springer
15 years 1 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol