Outsourced

Results: 300



#Item
51BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren1 , Mart´ın Ochoa2,3 , and Andrei Sabelfeld1 1

BetterTimes Privacy-assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields Per Hallgren1 , Mart´ın Ochoa2,3 , and Andrei Sabelfeld1 1

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2015-09-01 04:55:38
    52VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets Aydin Abadi, Sotirios Terzis, and Changyu Dong Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK

    VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets Aydin Abadi, Sotirios Terzis, and Changyu Dong Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK

    Add to Reading List

    Source URL: fc16.ifca.ai

    Language: English - Date: 2016-02-08 20:23:34
      53VEN DOR R E V I E W FO R OU T S OU RC ED B U S IN ES S OFFIC E H e a lt h Ca r e Are we getting what we paid for from our vendor? If you have outsourced your business office function, it’s important to evaluate whether

      VEN DOR R E V I E W FO R OU T S OU RC ED B U S IN ES S OFFIC E H e a lt h Ca r e Are we getting what we paid for from our vendor? If you have outsourced your business office function, it’s important to evaluate whether

      Add to Reading List

      Source URL: www.eidebailly.com

      Language: English - Date: 2015-10-28 15:16:18
        54On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

        On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

        Add to Reading List

        Source URL: digitalpiglet.org

        Language: English - Date: 2009-11-27 08:30:51
        55© Springer Berlin / Heidelberg, Lecture Notes in Computer Sciencehttp://link.springer.com/chapter%2F9781_17 Support for write privileges on outsourced data Sabrina De Capitani di Vimercati1

        © Springer Berlin / Heidelberg, Lecture Notes in Computer Sciencehttp://link.springer.com/chapter%2F9781_17 Support for write privileges on outsourced data Sabrina De Capitani di Vimercati1

        Add to Reading List

        Source URL: spdp.di.unimi.it

        Language: English - Date: 2012-12-10 09:50:06
          56VENDOR SELECTION FOR OUTSOURCED BUSINESS OFFICE H e a lt h Ca r e Why should my organization consider outsourcing our business office function? Many health care organizations consider outsourcing the business office func

          VENDOR SELECTION FOR OUTSOURCED BUSINESS OFFICE H e a lt h Ca r e Why should my organization consider outsourcing our business office function? Many health care organizations consider outsourcing the business office func

          Add to Reading List

          Source URL: www.eidebailly.com

          Language: English - Date: 2015-10-28 15:16:31
            57Client success story  Areas of assistance  A fully cloud-based enterprise resource planning (ERP) system outsourced transactional finance processes and information technology (IT) support

            Client success story Areas of assistance  A fully cloud-based enterprise resource planning (ERP) system outsourced transactional finance processes and information technology (IT) support

            Add to Reading List

            Source URL: www.kpmg.com

            Language: English - Date: 2013-12-16 02:24:43
              58a certicom application note  Certicom Security for Fabless Semiconductor Design Companies  control your outsourced manufacturing channel with a proven security solution that is

              a certicom application note Certicom Security for Fabless Semiconductor Design Companies control your outsourced manufacturing channel with a proven security solution that is

              Add to Reading List

              Source URL: www.certicom.com

              Language: English - Date: 2010-02-26 18:11:11
              59Over-encryption: Management of Access Control Evolution on Outsourced Data Sara Foresti Sushil Jajodia

              Over-encryption: Management of Access Control Evolution on Outsourced Data Sara Foresti Sushil Jajodia

              Add to Reading List

              Source URL: spdp.di.unimi.it

              Language: English - Date: 2012-12-10 09:50:10
                60Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

                Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

                Add to Reading List

                Source URL: fc12.ifca.ai

                Language: English - Date: 2012-02-18 14:33:45