Projects related to 10-2012-2759

Results Found (2)
Technology NameBriefcaseLead Researcher
Highlights New protocol for certification of electronic identity Protects against computer corruption by viruses and hacker activities Successfully demonstrated capability to prevent  an impostor being accepted as user Secure certification ...
Weinshall Daphna
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
Segev Gil