-
2
-
-
84921046600
-
Delegation-based authentication and authorization for the ipbased internet of things
-
R. Hummen, H. Shafagh, S. Raza, T. Voigt, and K. Wehrle. Delegation-based Authentication and Authorization for the IPbased Internet of Things. In IEEE Sensor and Ad Hoc Communications and Networks (SECON), 2014.
-
(2014)
IEEE Sensor and Ad Hoc Communications and Networks (SECON)
-
-
Hummen, R.1
Shafagh, H.2
Raza, S.3
Voigt, T.4
Wehrle, K.5
-
3
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Ko gl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: Tool for Automating Secure Two-party Computations. In ACM Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Computer and Communications Security (CCS)
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
7
-
-
85076880634
-
Building web applications on top of encrypted data using mylar
-
R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan. Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2014.
-
(2014)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Popa, R.A.1
Stark, E.2
Valdez, S.3
Helfer, J.4
Zeldovich, N.5
Balakrishnan, H.6
-
9
-
-
84954262791
-
Private database queries using somewhat homomorphic encryption
-
D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu. Private Database Queries Using Somewhat Homomorphic Encryption. In Applied Cryptography and Network Security (ACNS), 2013.
-
(2013)
Applied Cryptography and Network Security (ACNS)
-
-
Boneh, D.1
Gentry, C.2
Halevi, S.3
Wang, F.4
Wu, D.J.5
-
11
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, Ill, Nov. ACM Press
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pages 199-212, Chicago, Ill, Nov. 2009. ACM Press.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
12
-
-
68249129760
-
-
Technical report, February
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, February 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
18
-
-
53149149860
-
Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks
-
P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, and R. Dahab. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In Embedded Wireless Systems and Networks (EWSN), 2008.
-
(2008)
Embedded Wireless Systems and Networks (EWSN)
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
20
-
-
84954262791
-
Private database queries using somewhat homomorphic encryption
-
D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu. Private Database Queries Using Somewhat Homomorphic Encryption. In Applied Cryptography and Network Security (ACNS), 2013.
-
(2013)
Applied Cryptography and Network Security (ACNS)
-
-
Boneh, D.1
Gentry, C.2
Halevi, S.3
Wang, F.4
Wu, D.J.5
-
22
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Kogl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: Tool for Automating Secure Two-party Computations. In ACM Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Computer and Communications Security (CCS)
-
-
Henecka, W.1
Ko Gl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
25
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
Mar
-
S. Madden, M. Franklin, J. Hellerstein, and W. Hong. TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems (TODS), 30(1), Mar 2005.
-
(2005)
ACM Transactions on Database Systems (TODS)
, vol.30
, Issue.1
-
-
Madden, S.1
Franklin, M.2
Hellerstein, J.3
Hong, W.4
-
26
-
-
67650690965
-
Orderpreserving symmetric encryption
-
Cologne, Germany, April
-
A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Orderpreserving symmetric encryption. In Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), Cologne, Germany, April 2009.
-
(2009)
Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
28
-
-
82655174072
-
IBM touts encryption innovation; New technology performs calculations on encrypted data without decrypting it
-
June
-
M. Cooney. IBM touts encryption innovation; new technology performs calculations on encrypted data without decrypting it. Computer World, June 2009.
-
(2009)
Computer World
-
-
Cooney, M.1
-
29
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, October
-
E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
|