Sciweavers

469 search results - page 61 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 2 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
ICASSP
2008
IEEE
14 years 2 months ago
Blind maximum-likelihood data recovery in OFDM
OFDM modulation combines the advantages of high achievable rates and relatively easy implementation. In this paper, we show how to perform blind maximum-likelihood data recovery i...
T. Y. Al-Naffouri, Ahmed Abdul Quadeer
USS
2010
13 years 5 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
JMIS
2011
66views more  JMIS 2011»
12 years 10 months ago
Drivers of the Long Tail Phenomenon: An Empirical Analysis
: The Internet makes it easy to offer large assortments of products, tempting managers to chase the “long tail”—that is, the phenomenon in which niche products gain a signifi...
Oliver Hinz, Jochen Eckert, Bernd Skiera