Sciweavers

2272 search results - page 315 / 455
» Provable Data Privacy
Sort
View
152
Voted
CCS
2010
ACM
14 years 12 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
104
Voted
MOC
2010
14 years 9 months ago
Error bound between monotone difference schemes and their modified equations
It is widely believed that if monotone difference schemes are applied to the linear convection equation with discontinuous initial data, then solutions of the monotone schemes are ...
Zhen-Huan Teng
122
Voted
MOC
2010
14 years 9 months ago
Approximation of stationary statistical properties of dissipative dynamical systems: Time discretization
We consider temporal approximation of stationary statistical properties of dissipative complex dynamical systems. We demonstrate that stationary statistical properties of the time...
Xiaoming Wang
155
Voted
CCS
2011
ACM
14 years 2 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
156
Voted
CCS
2011
ACM
14 years 2 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...