Sciweavers

24188 search results - page 128 / 4838
» Computing on Encrypted Data
Sort
View
CCS
2010
ACM
15 years 4 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
ICCS
2004
Springer
15 years 10 months ago
A Dynamic Data Driven Computational Infrastructure for Reliable Computer Simulations
J. Tinsley Oden, James C. Browne, Ivo Babuska, Cha...
CIDM
2007
IEEE
15 years 4 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
15 years 10 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...