Sciweavers

469 search results - page 61 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 8 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
CCS
2008
ACM
15 years 3 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
ICASSP
2008
IEEE
15 years 8 months ago
Blind maximum-likelihood data recovery in OFDM
OFDM modulation combines the advantages of high achievable rates and relatively easy implementation. In this paper, we show how to perform blind maximum-likelihood data recovery i...
T. Y. Al-Naffouri, Ahmed Abdul Quadeer
USS
2010
14 years 11 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
JMIS
2011
66views more  JMIS 2011»
14 years 4 months ago
Drivers of the Long Tail Phenomenon: An Empirical Analysis
: The Internet makes it easy to offer large assortments of products, tempting managers to chase the “long tail”—that is, the phenomenon in which niche products gain a signifi...
Oliver Hinz, Jochen Eckert, Bernd Skiera