Sciweavers

469 search results - page 35 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
IRREGULAR
1997
Springer
13 years 12 months ago
Parallel Shared-Memory State-Space Exploration in Stochastic Modeling
Stochastic modeling forms the basis for analysis in many areas, including biological and economic systems, as well as the performance and reliability modeling of computers and comm...
Susann C. Allmaier, Graham Horton
CCS
2007
ACM
14 years 1 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
SEMWEB
2007
Springer
14 years 1 months ago
Web Search Personalization Via Social Bookmarking and Tagging
Abstract. In this paper, we present a new approach to web search personalization based on user collaboration and sharing of information about web documents. The proposed personaliz...
Michael G. Noll, Christoph Meinel
ISPA
2007
Springer
14 years 1 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
ACSAC
2005
IEEE
14 years 1 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani