Sciweavers

27 search results - page 4 / 6
» Protecting Privacy in Key-Value Search Systems
Sort
View
ICDCS
2010
IEEE
13 years 8 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
CCS
2011
ACM
12 years 11 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
SAC
2006
ACM
13 years 10 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
INFOCOM
2010
IEEE
13 years 9 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
CCS
2008
ACM
14 years 26 days ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov