![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
In this paper, we introduce the notion of verifiably encrypted cascade-instantiable blank signatures (CBS) in a multi-user setting. In CBS, there is a delegation chain that starts with an originator and is follow...
-
Article
Detecting anomaly collections using extreme feature ranks
Detecting anomaly collections is an important task with many applications, including spam and fraud detection. In an anomaly collection, entities often operate in collusion and hold different agendas to normal...
-
Chapter and Conference Paper
Verifiable Computation on Outsourced Encrypted Data
On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authe...
-
Chapter
Cryptography Foundation
The query authentication schemes that we cover in this book make extensive use of cryptographic constructs. In this chapter, we give a working definition of those constructs; the reader is encouraged to refer ...
-
Chapter
Data Streams
Electronic services like stock trading, online bidding, RFID-enabled supply chain management, environment sensing and monitoring, have become commonplace, especially with the widespread adoption of mobile devi...
-
Chapter
Introduction
In data publishing, a data owner delegates the role of satisfying user queries to a third-party publisher [Devanbu et al., 2000, Miklau and Suciu, 2003]. This model is applicable to a wide range of computing p...
-
Chapter
Text Search Queries
Professional users commonly require certain security provisions from their paid content services. This is particularly so in the financial and legal industries. One security provision is integrity assurance [Pfle...
-
Chapter
Conclusion
In data publishing, owners outsource their data and processing logics to a third-party publisher. This raises security concerns. In particular, there is a need to ensure users that answers to their queries are...
-
Chapter
Spatial Queries
There are many applications that manipulate spatial data. For example, Geographic Information Systems (GIS) represent locations as points, rivers and highways as lines and lakes and cities as regions. As anoth...
-
Book
-
Chapter
Relational Queries
As we saw in Chapter 2, the cryptographic protocols that form the foundation of query answer authentication, particularly the Merkle Hash Tree, are designed for verifying ordered lists. Since a tree-structured...
-
Article
Efficient processing of exact top-k queries over disk-resident sorted lists
The top-k query is employed in a wide range of applications to generate a ranked list of data that have the highest aggregate scores over certain attributes. As the pool of attributes for selection by individual ...
-
Chapter and Conference Paper
Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes
Extracting textured objects from natural scenes is a challenging task in computer vision. The main difficulties arise from the intrinsic randomness of natural textures and the high-semblance between the object...
-
Chapter and Conference Paper
Dual Phase Learning for Large Scale Video Gait Recognition
Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficien...
-
Article
Partially materialized digest scheme: an efficient verification method for outsourced databases
In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be ...
-
Chapter and Conference Paper
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant to a given information seekin...
-
Chapter and Conference Paper
Authenticating Multi-dimensional Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. Th...
-
Article
Social Network Discovery by Mining Spatio-Temporal Events
Knowing patterns of relationship in a social network is very useful for law enforcement agencies to investigate collaborations among criminals, for businesses to exploit relationships to sell products, or for ...
-
Book and Conference Proceedings
Information Security Practice and Experience
First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings
-
Chapter and Conference Paper
Authenticating Query Results in Data Publishing
We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are ag...