Sciweavers

242 search results - page 20 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
IEEEARES
2008
IEEE
15 years 3 months ago
haplog: A Hash-Only and Privacy-Preserved Secure Logging Mechanism
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes...
Chih-Yin Lin
SIGCPR
2006
ACM
346views Hardware» more  SIGCPR 2006»
15 years 3 months ago
An extension of the UTAUT model with e-quality, trust, and satisfaction constructs
This research seeks to validate a comprehensive model of quality in the context of e-business systems. It also extends the UTAUT model with e-quality, trust, and satisfaction cons...
Erin Cody-Allen, Rajiv Kishore
NDSS
2009
IEEE
15 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
78
Voted
CEEMAS
2007
Springer
15 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes