Projects related to 10-2015-3126

Results Found (3)
Technology NameBriefcaseLead Researcher
Searchable symmetric encryption with practical big-data performance and strong security Outsourcing data storage to remote servers offers invaluable benefits while introducing many concerns when dealing with sensitive data.  In the presence of ...
Segev Gil
  The Internet infrastructure was not designed with security in mind, and is consequently alarmingly vulnerable to attacks and configuration errors. Despite the consensus on the urgency of securing BGP routing, replacing BGP with S*BGP is still ...
Schapira Michael
Application Competitive applications processes are widely implemented across academic and nonacademic organizations. Managing the application processes is highly sensitive for both sides. Application processes like scholarships, tenure track ...
Kramer Diego