Sciweavers

125 search results - page 14 / 25
» All Secrets Great and Small
Sort
View
145
Voted
MOBIHOC
2005
ACM
16 years 1 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
142
Voted
EUROCRYPT
2006
Springer
15 years 5 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
121
Voted
CCS
2010
ACM
15 years 2 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
USS
2010
14 years 11 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
85
Voted
MICCAI
2004
Springer
16 years 2 months ago
Non-rigid Atlas to Subject Registration with Pathologies for Conformal Brain Radiotherapy
Warping a digital atlas toward a patient image allows the simultaneous segmentation of several structures. This may be of great interest for cerebral images, since the brain contai...
Radu Stefanescu, Olivier Commowick, Grégoir...