Sciweavers

3047 search results - page 204 / 610
» A Secure Distributed Search System
Sort
View
147
Voted
USENIX
2007
15 years 6 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
148
Voted
TRUST
2009
Springer
15 years 10 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
242
Voted
CADE
2011
Springer
14 years 3 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
139
Voted
ACIVS
2005
Springer
15 years 9 months ago
Interactive Object-Based Retrieval Using Relevance Feedback
In this paper we present an interactive, object-based video retrieval system which features a novel query formulation method that is used to iteratively refine an underlying model...
Sorin Sav, Hyowon Lee, Noel E. O'Connor, Alan F. S...
134
Voted
ICNP
2006
IEEE
15 years 9 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang