Sciweavers

469 search results - page 23 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 5 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
IPPS
2007
IEEE
14 years 2 months ago
Parallel Audio Quick Search on Shared-Memory Multiprocessor Systems
Audio search plays an important role in analyzing audio data and retrieving useful audio information. In this paper, a Partially Overlapping Block-Parallel Active Search method (P...
Yurong Chen, Wei Wei, Yimin Zhang
EUROCRYPT
2004
Springer
14 years 1 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
SYRCODIS
2008
104views Database» more  SYRCODIS 2008»
13 years 9 months ago
Search Request Routing in Bittorrent and other P2P based File Sharing Networks
Existing p2p file sharing networks doesn't always give their users abilities to make an effective and fast searches for particular data. In this paper we introduce some impro...
Konstantin Scherbakov
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 9 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu