Sciweavers

151 search results - page 25 / 31
» his 2009
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
CHI
2009
ACM
15 years 10 months ago
Supporting family engagement in weight management
Nathalie Colineau, CSIRO ? ICT Centre Locked Bag 17 North Ryde, NSW 1670 Australia nathalie.colineau@csiro.au C?cile Paris CSIRO ? ICT Centre Locked Bag 17 North Ryde, NSW 1670 Aus...
Cécile Paris, Dipak Bhandari, Nathalie Coli...
EUROCRYPT
2009
Springer
15 years 10 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
TCC
2009
Springer
124views Cryptology» more  TCC 2009»
15 years 10 months ago
Universally Composable Multiparty Computation with Partially Isolated Parties
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
ECIR
2009
Springer
15 years 6 months ago
Current Developments in Information Retrieval Evaluation
: In the last decade, many evaluation results have been created within the evaluation initiatives like TREC, NTCIR and CLEF. The large amount of data available has led to substanti...
Thomas Mandl