Sciweavers

3299 search results - page 542 / 660
» Privacy and Trusted Computing
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
SASN
2005
ACM
15 years 9 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
ICICS
2005
Springer
15 years 9 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
ISI
2005
Springer
15 years 9 months ago
Modeling and Multiway Analysis of Chatroom Tensors
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link betwe...
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. ...
ISI
2005
Springer
15 years 9 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...