Sciweavers

6195 search results - page 11 / 1239
» Cloud Computing Security
Sort
View
153
Voted
STOC
2012
ACM
236views Algorithms» more  STOC 2012»
13 years 4 months ago
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted “cloud” server. In this notion that we call on-the-fly multiparty c...
Adriana López-Alt, Eran Tromer, Vinod Vaiku...
CSE
2009
IEEE
15 years 6 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
PET
2012
Springer
13 years 4 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
114
Voted
ICIP
2010
IEEE
15 years 11 days ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
CORR
2010
Springer
388views Education» more  CORR 2010»
15 years 2 months ago
Research Challenges for Enterprise Cloud Computing
Cloud computing represents a shift away from computing as a product that is purchased, to computing as a service that is delivered to consumers over the internet from large-scale ...
Ali Khajeh-Hosseini, Ian Sommerville, Ilango Srira...