Sciweavers

390 search results - page 68 / 78
» Protecting Data Privacy in Structured P2P Networks
Sort
View
115
Voted
BMCBI
2010
172views more  BMCBI 2010»
14 years 4 months ago
Nonparametric identification of regulatory interactions from spatial and temporal gene expression data
Background: The correlation between the expression levels of transcription factors and their target genes can be used to infer interactions within animal regulatory networks, but ...
Anil Aswani, Soile V. E. Keränen, James Brown...
77
Voted
INFOCOM
2010
IEEE
14 years 7 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
CCS
2011
ACM
13 years 9 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
87
Voted
CCS
2008
ACM
14 years 11 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
CCS
2009
ACM
15 years 10 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin