Sciweavers

3210 search results - page 111 / 642
» Secure Similarity Search
Sort
View
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
15 years 11 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
BMCBI
2011
15 years 15 hour ago
Clinical Synopsis Search in OMIM
Background: The OMIM database is a tool used daily by geneticists. Syndrome pages include a Clinical Synopsis section containing a list of known phenotypes comprising a clinical s...
Raphael Cohen, Avitan Gefen, Michael Elhadad, Ohad...
ICDM
2010
IEEE
276views Data Mining» more  ICDM 2010»
15 years 3 months ago
Accelerating Dynamic Time Warping Subsequence Search with GPUs and FPGAs
Many time series data mining problems require subsequence similarity search as a subroutine. While this can be performed with any distance measure, and dozens of distance measures ...
Doruk Sart, Abdullah Mueen, Walid A. Najjar, Eamon...
127
Voted
ACISP
2007
Springer
15 years 9 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
126
Voted
ACSAC
2006
IEEE
15 years 11 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...