Sciweavers

134 search results - page 8 / 27
» The First Experimental Cryptanalysis of the Data Encryption ...
Sort
View
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 7 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen
BIOINFORMATICS
2010
116views more  BIOINFORMATICS 2010»
13 years 7 months ago
A principal skeleton algorithm for standardizing confocal images of fruit fly nervous systems
Motivation: The fruit fly (Drosophila melanogaster) is a commonly used model organism in biology. We are currently building a 3D digital atlas of the fruit fly larval nervous syst...
Lei Qu, Hanchuan Peng
ICCCN
2008
IEEE
14 years 1 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
PVLDB
2010
117views more  PVLDB 2010»
13 years 5 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...