Sciweavers

1422 search results - page 285 / 285
» The Set and Function Approach to Modeling Authorization in D...
Sort
View
CN
2004
256views more  CN 2004»
13 years 5 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
FC
2009
Springer
150views Cryptology» more  FC 2009»
14 years 16 days ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung