Sciweavers

24188 search results - page 110 / 4838
» Computing on Encrypted Data
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 2 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 2 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
WINET
2010
199views more  WINET 2010»
15 years 1 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
CORR
2000
Springer
83views Education» more  CORR 2000»
15 years 2 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
131
Voted
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
15 years 8 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...