Sciweavers

5891 search results - page 75 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
DGO
2004
114views Education» more  DGO 2004»
15 years 2 months ago
Regression on Distributed Databases via Secure Multi-Party Computation
Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerom...
IEEESP
2008
82views more  IEEESP 2008»
15 years 1 months ago
Securing Information Transfer in Distributed Computing Environments
Siani Pearson, Marco Casassa Mont, Manny Novoa
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 7 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
CSREASAM
2009
14 years 11 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong