Sciweavers

8972 search results - page 74 / 1795
» Private Information Retrieval
Sort
View
SDMW
2004
Springer
15 years 4 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan
NDSS
1999
IEEE
15 years 3 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
ICICS
1999
Springer
15 years 3 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
MASS
2010
181views Communications» more  MASS 2010»
14 years 9 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
ANLP
1994
86views more  ANLP 1994»
15 years 12 days ago
Robust Text Processing in Automated Information Retrieval
We report on the results of a series of experiments with a prototype text retrieval system which uses relatively advanced natural language processing techniques in order to enhanc...
Tomek Strzalkowski