Sciweavers

207 search results - page 4 / 42
» Predicate Privacy in Encryption Systems
Sort
View
68
Voted
CCS
2004
ACM
15 years 3 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
ACSAC
2002
IEEE
15 years 2 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
ICDCS
2011
IEEE
13 years 9 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
68
Voted
ACSAC
2008
IEEE
15 years 4 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...
OOPSLA
2010
Springer
14 years 8 months ago
Mostly modular compilation of crosscutting concerns by contextual predicate dispatch
The modularity of aspect-oriented programming (AOP) has been a controversial issue. To investigate this issue compared with object-oriented programming (OOP), we propose a simple ...
Shigeru Chiba, Atsushi Igarashi, Salikh Zakirov