Sciweavers

149 search results - page 7 / 30
» Practical Techniques for Searches on Encrypted Data
Sort
View
IACR
2011
113views more  IACR 2011»
12 years 8 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren
MICAI
2004
Springer
14 years 2 months ago
Faster Proximity Searching in Metric Data
A number of problems in computer science can be solved efficiently with the so called memory based or kernel methods. Among this problems (relevant to the AI community) are multime...
Edgar Chávez, Karina Figueroa
SIGMOD
2004
ACM
140views Database» more  SIGMOD 2004»
14 years 9 months ago
SoundCompass: A Practical Query-by-Humming System
This paper describes our practical query-by-humming system, SoundCompass, which is being used as a karaoke song selection system in Japan. First, we describe the fundamental techn...
Naoko Kosugi, Yasushi Sakurai, Masashi Morimoto
SSD
2009
Springer
193views Database» more  SSD 2009»
14 years 3 months ago
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
Outsourcing data to third party data providers is becoming a common practice for data owners to avoid the cost of managing and maintaining databases. Meanwhile, due to the populari...
Wei-Shinn Ku, Ling Hu, Cyrus Shahabi, Haixun Wang
ACSAC
2007
IEEE
14 years 3 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...