Sciweavers

2272 search results - page 286 / 455
» Provable Data Privacy
Sort
View
121
Voted
IJNSEC
2010
146views more  IJNSEC 2010»
14 years 9 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
MOC
2010
14 years 9 months ago
A numerical method for fractal conservation laws
: We consider a fractal scalar conservation law, that is to say a conservation law modified by a fractional power of the Laplace operator, and we propose a numerical method to appr...
Jérôme Droniou
AMW
2011
14 years 6 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
108
Voted
ARESEC
2011
110views more  ARESEC 2011»
14 years 2 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
128
Voted
MOBIHOC
2008
ACM
16 years 2 months ago
Rendezvous design algorithms for wireless sensor networks with a mobile base station
Recent research shows that significant energy saving can be achieved in wireless sensor networks with a mobile base station that collects data from sensor nodes via short-range co...
Guoliang Xing, Tian Wang, Weijia Jia, Minming Li