Sciweavers

264 search results - page 21 / 53
» Minimal-Latency Secure Function Evaluation
Sort
View
134
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 10 months ago
Oblivious Keyword Search Protocols in the Public Database Model
— Databases associated with keywords, can be public, private or hybrid, as a result the solutions to keyword search protocols for each type are different. In this paper, we study...
Huafei Zhu, Feng Bao
96
Voted
ICC
2007
IEEE
15 years 10 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
131
Voted
HOST
2008
IEEE
15 years 10 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
111
Voted
VTC
2007
IEEE
101views Communications» more  VTC 2007»
15 years 10 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
16 years 3 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan