Sciweavers

149 search results - page 20 / 30
» Practical Techniques for Searches on Encrypted Data
Sort
View
TC
2008
13 years 9 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ML
2008
ACM
13 years 9 months ago
Discovering significant patterns
Pattern discovery techniques, such as association rule discovery, explore large search spaces of potential patterns to find those that satisfy some user-specified constraints. Due...
Geoffrey I. Webb
SYRCODIS
2007
72views Database» more  SYRCODIS 2007»
13 years 10 months ago
An XML-to-Relational User-Driven Mapping Strategy Based on Similarity and Adaptivity
As XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to exploit...
Irena Mlynkova
IACR
2011
209views more  IACR 2011»
12 years 8 months ago
Improved Attacks on Full GOST
GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic eff...
Itai Dinur, Orr Dunkelman, Adi Shamir
WOSP
2005
ACM
14 years 2 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...