Sciweavers

242 search results - page 30 / 49
» Cryptographic Cloud Storage
Sort
View
LREC
2008
113views Education» more  LREC 2008»
14 years 8 days ago
Integration of a Multilingual Keyword Extractor in a Document Management System
In this paper we present a new Document Management System called DrStorage. This DMS is multi-platform, JCR-170 compliant, supports WebDav, versioning, user authentication and aut...
Andrea Agili, Marco Fabbri, Alessandro Panunzi, Ma...
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 9 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
CIKM
2008
Springer
14 years 25 days ago
Creating tag hierarchies for effective navigation in social media
In social media, such as blogs, since the content naturally evolves over time, it is hard or in many cases impossible to organize the content for effective navigation. Thus, one c...
K. Selçuk Candan, Luigi Di Caro, Maria Luis...
ASPLOS
2011
ACM
13 years 2 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
ACSAC
2007
IEEE
14 years 5 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist