Sciweavers

242 search results - page 38 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
ACISICIS
2007
IEEE
15 years 3 months ago
Nanorobots for Laparoscopic Cancer Surgery
This paper presents an innovative hardware architecture for medical nanorobots, using nanobioelectronics, clinical data, and wireless technologies, as embedded integrated system d...
Adriano Cavalcanti, Bijan Shirinzadeh, Declan Murp...
CBMS
2008
IEEE
15 years 3 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
83
Voted
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
15 years 9 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 3 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 3 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin