Sciweavers

1717 search results - page 122 / 344
» Data Integrity in a Distributed Storage System
Sort
View
150
Voted
ICICS
2007
Springer
15 years 7 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
101
Voted
AEI
2010
115views more  AEI 2010»
15 years 3 months ago
BRAHMS: Novel middleware for integrated systems computation
Abstract-- Computational modellers are becoming increasingly interested in building large, eclectic, biological models. These may integrate nervous system components at various lev...
Benjamin Mitchinson, Tak-Shing Chan, Jonathan M. C...
134
Voted
WISTP
2010
Springer
15 years 1 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
110
Voted
ESORICS
2004
Springer
15 years 8 months ago
Towards a Theory of Data Entanglement: (Extended Abstract)
d Abstract) James Aspnes , Joan Feigenbaum , Aleksandr Yampolskiy † , and Sheng Zhong ‡ Department of Computer Science, Yale University, New Haven CT 06520-8285, USA Abstract. ...
James Aspnes, Joan Feigenbaum, Aleksandr Yampolski...
103
Voted
ICDIM
2007
IEEE
15 years 9 months ago
Minimality quality criterion evaluation for integrated schemas
: Integrated access to distributed data is an important problem faced in scientific and commercial applications. A data integration system provides a unified view for users to subm...
Maria da Conceição Moraes Batista, A...