Sciweavers

2272 search results - page 3 / 455
» Provable Data Privacy
Sort
View
ICDT
2007
ACM
148views Database» more  ICDT 2007»
14 years 12 days ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork
CCS
2001
ACM
13 years 10 months ago
Provably authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
CCS
2006
ACM
13 years 10 months ago
Provably secure password-based authentication in TLS
Michel Abdalla, Emmanuel Bresson, Olivier Chevassu...
ESORICS
2006
Springer
13 years 10 months ago
Privacy-Preserving Queries on Encrypted Data
Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CCS
2010
ACM
14 years 22 days ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...