Sciweavers

4264 search results - page 1 / 853
» Provenance-aware secure networks
Sort
View
ICDE
2005
IEEE
115views Database» more  ICDE 2005»
13 years 10 months ago
Provenance-Aware Sensor Data Storage
Abstract— Sensor network data has both historical and realtime value. Making historical sensor data useful, in particular, requires storage, naming, and indexing. Sensor data pre...
Jonathan Ledlie, Chaki Ng, David A. Holland
SP
2002
IEEE
13 years 4 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
SAFECOMP
2010
Springer
13 years 3 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
PERCOM
2010
ACM
13 years 3 months ago
When Eco-IT meets security: Concealed network coding for multicast traffic
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff