Sciweavers

2217 search results - page 393 / 444
» A Data Privacy Taxonomy
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 7 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
140
Voted
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 5 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
97
Voted
LREC
2010
237views Education» more  LREC 2010»
15 years 5 months ago
The Alborada-I3A Corpus of Disordered Speech
This paper describes the "Alborada-I3A" corpus of disordered speech, acquired during the recent years for the research in different speech technologies for the handicapp...
Oscar Saz, Eduardo Lleida, Carlos Vaquero, William...
ICASSP
2010
IEEE
15 years 4 months ago
Distributed Lasso for in-network linear regression
The least-absolute shrinkage and selection operator (Lasso) is a popular tool for joint estimation and continuous variable selection, especially well-suited for the under-determin...
Juan Andrés Bazerque, Gonzalo Mateos, Georg...
COMCOM
2008
91views more  COMCOM 2008»
15 years 4 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia