Sciweavers

485 search results - page 2 / 97
» Continuous Spatial Authentication
Sort
View
116
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 12 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
109
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 10 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2009
ACM
147views Database» more  VLDB 2009»
15 years 12 months ago
Authenticated indexing for outsourced spatial databases
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
WIS
2004
15 years 1 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur