Sciweavers

2272 search results - page 18 / 455
» Provable Data Privacy
Sort
View
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 7 months ago
Biological data mining
Mohammed Javeed Zaki, Naren Ramakrishnan, Srinivas...
CCS
2011
ACM
12 years 7 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
ICIP
2006
IEEE
14 years 9 months ago
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ERSHOV
2003
Springer
14 years 1 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 9 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff