Sciweavers

268 search results - page 25 / 54
» An Adaptive Multiparty Protocol for Secure Data Protection
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
CCS
2009
ACM
14 years 16 days ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
SIGMOD
2007
ACM
115views Database» more  SIGMOD 2007»
14 years 8 months ago
Privacy preserving schema and data matching
In many business scenarios, record matching is performed across different data sources with the aim of identifying common information shared among these sources. However such need...
Monica Scannapieco, Ilya Figotin, Elisa Bertino, A...
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 2 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
EUSAI
2007
Springer
14 years 2 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany