Sciweavers

242 search results - page 14 / 49
» Cryptographic Cloud Storage
Sort
View
HPDC
2010
IEEE
13 years 8 months ago
Early observations on the performance of Windows Azure
A significant open issue in cloud computing is performance. Few, if any, cloud providers or technologies offer quantitative performance guarantees. Regardless of the potential adv...
Zach Hill, Jie Li, Ming Mao, Arkaitz Ruiz-Alvarez,...
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
14 years 24 days ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
USENIX
2003
13 years 8 months ago
The CryptoGraphic Disk Driver
We present the design and implementation of CGD, the CryptoGraphic Disk driver. CGD is a pseudo-device driver that sits below the buffer cache, and provides an encrypted view of a...
Roland C. Dowdeswell, John Ioannidis
PAISI
2010
Springer
13 years 5 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava