Sciweavers

179 search results - page 16 / 36
» Symmetric-Key Homomorphic Encryption for Encrypted Data Proc...
Sort
View
ISI
2005
Springer
14 years 1 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
ICIP
2008
IEEE
14 years 2 months ago
A novel video encryption technique based on secret sharing
The rapid growth of the Internet and digitized content made video distribution simpler. Hence the need for video data protection is on the rise. In this paper, we propose a secure...
Chigullapally Narsimha Raju, Ganugula Umadevi, Kan...
SEC
2007
13 years 9 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsou...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
AISS
2010
119views more  AISS 2010»
13 years 5 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
ICIP
2008
IEEE
14 years 9 months ago
Resolution-progressive compression of encrypted grayscale images
Compression of encrypted data can be achieved by employing Slepian-Wolf coding (SWC). However, how to efficiently exploit the source dependency in an encrypted colored signal such...
Wei Liu, Wenjun Zeng, Lina Dong, Qiuming Yao