Sciweavers

2272 search results - page 217 / 455
» Provable Data Privacy
Sort
View
171
Voted
ICC
2009
IEEE
171views Communications» more  ICC 2009»
15 years 1 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
152
Voted
COMPGEOM
2004
ACM
15 years 9 months ago
Locality-sensitive hashing scheme based on p-stable distributions
We present a novel Locality-Sensitive Hashing scheme for the Approximate Nearest Neighbor Problem under ÐÔ norm, based on Ôstable distributions. Our scheme improves the running...
Mayur Datar, Nicole Immorlica, Piotr Indyk, Vahab ...
239
Voted
ICNP
1997
IEEE
15 years 7 months ago
Optimal Feedback Control for ABR Service in ATM
The e cient support of data tra c over ATM networks requires congestion control, whose objectives include maximizing throughput, minimizing switch bu er requirement, and attaining...
Paolo Narváez, Kai-Yeung Siu
ASIACRYPT
2008
Springer
15 years 5 months ago
Compact Proofs of Retrievability
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build syst...
Hovav Shacham, Brent Waters
113
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang