Sciweavers

878 search results - page 92 / 176
» A Compiler-Based Approach to Data Security
Sort
View
140
Voted
DAC
2006
ACM
16 years 4 months ago
A parallelized way to provide data encryption and integrity checking on a processor-memory bus
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking Engine), enabling to guarantee confidentiality and integrity of data exchanged b...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
IJWIN
2006
119views more  IJWIN 2006»
15 years 3 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
160
Voted
IAT
2006
IEEE
15 years 9 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
ICPR
2010
IEEE
15 years 1 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
PODS
1999
ACM
95views Database» more  PODS 1999»
15 years 7 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...