Sciweavers

7064 search results - page 1341 / 1413
» From States to Histories
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 4 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
SIGUCCS
2000
ACM
15 years 4 months ago
There is No Such Thing as Free Support
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
Dianne Brotherson
COCO
2000
Springer
65views Algorithms» more  COCO 2000»
15 years 4 months ago
On the Complexity of Quantum ACC
For any q > 1, let MODq be a quantum gate that determines if the number of 1’s in the input is divisible by q. We show that for any q, t > 1, MODq is equivalent to MODt (u...
Frederic Green, Steven Homer, Chris Pollett
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
SACMAT
2010
ACM
15 years 4 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
« Prev « First page 1341 / 1413 Last » Next »