Sciweavers

3349 search results - page 75 / 670
» Data Security
Sort
View
CCS
2010
ACM
15 years 7 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
SIGCSE
2005
ACM
129views Education» more  SIGCSE 2005»
15 years 8 months ago
Teaching students to hack: curriculum issues in information security
1 Teaching “hacking” as a legitimate means of training students in how to protect a future employer’s data assets has been introduced
Patricia Y. Logan, Allen Clarkson
VTC
2010
IEEE
114views Communications» more  VTC 2010»
15 years 1 months ago
A Secure Multi-Application Platform for Vehicle Telematics
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...
CCS
2006
ACM
15 years 7 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...
ISPA
2007
Springer
15 years 9 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong