Sciweavers

92 search results - page 15 / 19
» Practical Problems with a Cryptographic Protection Scheme
Sort
View
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
14 years 9 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
172
Voted
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 11 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SIGPRO
2002
114views more  SIGPRO 2002»
14 years 11 months ago
Error resilience and recovery in streaming of embedded video
The three-dimensional (3-D) SPIHT coder is a scalable or embedded coder that has proved its efficiency and its real-time capability in compression of video. A forward-error-correc...
Sungdae Cho, William A. Pearlman
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
ICALP
2005
Springer
15 years 5 months ago
Append-Only Signatures
We present a new primitive—Append-only Signatures (AOS)—with the property that any party given an AOS signature Sig[M1] on message M1 can compute Sig[M1 M2] for any message M2...
Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Bara...