Sciweavers

3452 search results - page 653 / 691
» Secure Data Outsourcing
Sort
View
EAGC
2003
Springer
15 years 5 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
CSE
2009
IEEE
15 years 4 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
DGO
2007
174views Education» more  DGO 2007»
15 years 1 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
121
Voted
GRAPHICSINTERFACE
2007
15 years 1 months ago
Progressive multiples for communication-minded visualization
This paper describes a communication-minded visualization called progressive multiples that supports both the forensic analysis and presentation of multidimensional event data. We...
Doantam Phan, Andreas Paepcke, Terry Winograd