Sciweavers

469 search results - page 44 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 8 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
STORAGESS
2005
ACM
14 years 1 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
WIDM
2006
ACM
14 years 1 months ago
The GEON portal: accelerating knowledge discovery in the geosciences
Geoscience studies produce data from various observations, experiments, and simulations at an enormous rate. With proliferation of applications and data formats, the geoscience re...
Ullas Nambiar, Bertram Ludäscher, Kai Lin, Ch...
EUROPAR
2003
Springer
14 years 28 days ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...