Sciweavers

878 search results - page 78 / 176
» A Compiler-Based Approach to Data Security
Sort
View
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
142
Voted
ESORICS
2004
Springer
15 years 9 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
100
Voted
ECIS
2004
15 years 5 months ago
Evaluating integration approaches benefits adopted by healthcare organisations
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
115
Voted
ATAL
2007
Springer
15 years 9 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
115
Voted
CCS
2009
ACM
15 years 10 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea