Sciweavers

5891 search results - page 75 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
DGO
2004
114views Education» more  DGO 2004»
15 years 5 months ago
Regression on Distributed Databases via Secure Multi-Party Computation
Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerom...
IEEESP
2008
82views more  IEEESP 2008»
15 years 3 months ago
Securing Information Transfer in Distributed Computing Environments
Siani Pearson, Marco Casassa Mont, Manny Novoa
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 10 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
151
Voted
CSREASAM
2009
15 years 1 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong