Sciweavers

2272 search results - page 217 / 455
» Provable Data Privacy
Sort
View
ICC
2009
IEEE
171views Communications» more  ICC 2009»
14 years 10 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
125
Voted
COMPGEOM
2004
ACM
15 years 6 months ago
Locality-sensitive hashing scheme based on p-stable distributions
We present a novel Locality-Sensitive Hashing scheme for the Approximate Nearest Neighbor Problem under ÐÔ norm, based on Ôstable distributions. Our scheme improves the running...
Mayur Datar, Nicole Immorlica, Piotr Indyk, Vahab ...
114
Voted
ICNP
1997
IEEE
15 years 5 months ago
Optimal Feedback Control for ABR Service in ATM
The e cient support of data tra c over ATM networks requires congestion control, whose objectives include maximizing throughput, minimizing switch bu er requirement, and attaining...
Paolo Narváez, Kai-Yeung Siu
96
Voted
ASIACRYPT
2008
Springer
15 years 2 months ago
Compact Proofs of Retrievability
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build syst...
Hovav Shacham, Brent Waters
91
Voted
IEEEIAS
2009
IEEE
15 years 7 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang