Sciweavers

86 search results - page 12 / 18
» Public Key Encryption That Allows PIR Queries
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 1 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 2 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
DGO
2003
139views Education» more  DGO 2003»
15 years 10 days ago
Better Public Policy Through Natural Language Information Access
Federal agencies implement laws passed by the Congress by creating rules and regulations that can be applied in practice. During this process, staffs at the various agencies may r...
Boris Katz, Roger Hurwitz, Jimmy J. Lin, Özle...
GEOINFO
2004
15 years 11 days ago
Towards Automatic Feature Type Publication
: The purpose of the WFS specification, proposed by the the OpenGIS Consortium (OGC), is to describe the manipulation operations over geospatial data using GML. Web servers providi...
Vânia Maria Ponte Vidal, Marcel Teixeira, F&...
CCS
2008
ACM
15 years 29 days ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin