Sciweavers

469 search results - page 43 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
ASIACRYPT
2000
Springer
15 years 7 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 10 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
CHI
2011
ACM
14 years 6 months ago
MemTable: an integrated system for capture and recall of shared histories in group workspaces
This paper presents the design, implementation, and evaluation of an interactive tabletop system that supports co-located meeting capture and asynchronous search and review of pas...
Seth E. Hunter, Pattie Maes, Stacey D. Scott, Henr...
116
Voted
ECIR
2009
Springer
16 years 13 days ago
Synchronous Collaborative Information Retrieval: Techniques and Evaluation
Synchronous Collaborative Information Retrieval refers to systems that support multiple users searching together at the same time in order to satisfy a shared information need. To ...
Colum Foley, Alan F. Smeaton
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 4 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...