Sciweavers

340 search results - page 14 / 68
» Computationally Private Information Retrieval with Polylogar...
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 1 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
NGC
2000
Springer
101views Communications» more  NGC 2000»
13 years 6 months ago
Information Access in Multimedia Databases Based on Feature Models
With the increasing popularity of the WWW, the main challenge in computer science has become content-based retrieval of multimedia objects. Access to multimedia objects in database...
Arjen P. de Vries, Menzo Windhouwer, Peter M. G. A...
ICTAC
2009
Springer
14 years 1 months ago
The Secret Art of Computer Programming
“Classical” program development by refinement [12, 2, 3] is a technique for ensuring that source-level program code remains faithful to the semantic goals set out in its corre...
Annabelle McIver
WWW
2008
ACM
14 years 7 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen