Sciweavers

149 search results - page 6 / 30
» Practical Techniques for Searches on Encrypted Data
Sort
View
IACR
2011
86views more  IACR 2011»
12 years 8 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ICIP
2010
IEEE
13 years 7 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
NDSS
2008
IEEE
14 years 3 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
SIGIR
2010
ACM
14 years 1 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
INFOCOM
2011
IEEE
13 years 16 days ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang