Sciweavers

39 search results - page 5 / 8
» Authorized Private Keyword Search over Encrypted Data in Clo...
Sort
View
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
14 years 2 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....
CCS
2007
ACM
14 years 1 months ago
Privacy preserving error resilient dna searching through oblivious automata
Human Desoxyribo-Nucleic Acid (DNA) sequences offer a wealth of information that reveal, among others, predisposition to various diseases and paternity relations. The breadth and...
Juan Ramón Troncoso-Pastoriza, Stefan Katze...
CCS
2011
ACM
12 years 7 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
CHI
2010
ACM
14 years 2 months ago
UpStream: motivating water conservation with low-cost water flow sensing and persuasive displays
Water is our most precious and most rapidly declining natural resource. We explore pervasive technology as an approach for promoting water conservation in public and private space...
Stacey Kuznetsov, Eric Paulos
UIST
2010
ACM
13 years 5 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li