Sciweavers

179 search results - page 10 / 36
» Symmetric-Key Homomorphic Encryption for Encrypted Data Proc...
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 10 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
JCSS
2008
96views more  JCSS 2008»
13 years 7 months ago
Stateless data concealment for distributed systems
With the growing number of Web applications and their variety, the need to prevent unauthorised access to data and to ensure data integrity in distributed systems has led to an in...
Rachid Anane, Sukhvir Dhillon, Behzad Bordbar
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
14 years 1 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra
DCC
2008
IEEE
14 years 7 months ago
Simultaneous Encryption/Compression of Images Using Alpha Rooting
Significant work has been done in the areas of image encryption and compression as two independent problems, yet the two areas are strongly interleaved and should be considered si...
Eric J. Wharton, Karen Panetta, Sos S. Agaian