Sciweavers

469 search results - page 31 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
TITB
2008
204views more  TITB 2008»
13 years 7 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
CCGRID
2003
IEEE
14 years 1 months ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...
CIA
2001
Springer
14 years 7 days ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
WINE
2005
Springer
143views Economy» more  WINE 2005»
14 years 1 months ago
An Analysis of Search Engine Switching Behavior Using Click Streams
In this paper, we propose a simple framework to characterize the switching behavior between search engines based on click streams. We segment users into a number of categories bas...
Yun-Fang Juan, Chi-Chao Chang
DSS
2007
226views more  DSS 2007»
13 years 7 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri