Sciweavers

207 search results - page 11 / 42
» Predicate Privacy in Encryption Systems
Sort
View
IWC
2010
86views more  IWC 2010»
13 years 5 months ago
Enhancing privacy management support in instant messaging
Instant Messaging (IM) is a useful tool for collaborative work. However, the awareness and communication features of IM pose a tension with privacy desires. Inadequate support for...
Sameer Patil, Alfred Kobsa
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
12 years 2 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 10 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 8 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina