Sciweavers

860 search results - page 145 / 172
» Completeness in two-party secure computation: a computationa...
Sort
View
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 3 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
ICRA
2006
IEEE
256views Robotics» more  ICRA 2006»
15 years 3 months ago
An Ankle-foot Emulation System for the Study of Human Walking Biomechanics
– Although below-knee prostheses have been commercially available for some time, today’s devices are completely passive, and consequently, their mechanical properties remain fi...
Samuel K. Au, Peter Dilworth, Hugh M. Herr
IWCMC
2006
ACM
15 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
COLCOM
2005
IEEE
15 years 3 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz
ICALP
2005
Springer
15 years 3 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor