Sciweavers

3452 search results - page 109 / 691
» Secure Data Outsourcing
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 3 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
TRUSTBUS
2004
Springer
14 years 3 months ago
Privacy Preserving Data Generation for Database Application Performance Testing
Abstract. Synthetic data plays an important role in software testing. In this paper, we initiate the study of synthetic data generation models for the purpose of application softwa...
Yongge Wang, Xintao Wu, Yuliang Zheng
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 5 months ago
Data Preservation in High Energy Physics - why, how and when?
Long-term preservation of data and software of large experiments and detectors in high energy physics is of utmost importance to secure the heritage of (mostly unique) data and to...
Siegfried Bethke
CCR
2006
76views more  CCR 2006»
13 years 10 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
OOPSLA
1998
Springer
14 years 2 months ago
Data Groups: Specifying the Modification of Extended State
This paper explores the interpretation of specifications in the context of an object-oriented programming language with subclassing and method overrides. In particular, the paper ...
K. Rustan M. Leino