Sciweavers

3451 search results - page 100 / 691
» Security of Backup Data
Sort
View
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 9 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
182
Voted
TRUSTBUS
2004
Springer
15 years 9 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
CORR
2010
Springer
141views Education» more  CORR 2010»
14 years 11 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang