Sciweavers

3349 search results - page 152 / 670
» Data Security
Sort
View
108
Voted
PET
2004
Springer
15 years 9 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
129
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
245
Voted
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
16 years 3 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
133
Voted
CCS
2006
ACM
15 years 7 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
SAINT
2009
IEEE
15 years 10 months ago
Understanding the Challenges in Securing Internet Routing
The Internet routing system plays an essential role of glueing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many ef...
Ricardo V. Oliveira, Mohit Lad, Lixia Zhang