Sciweavers

1510 search results - page 153 / 302
» Secure Distributed Data Aggregation
Sort
View
147
Voted
ICPADS
2010
IEEE
15 years 6 days ago
Enhancing MapReduce via Asynchronous Data Processing
The MapReduce programming model simplifies large-scale data processing on commodity clusters by having users specify a map function that processes input key/value pairs to generate...
Marwa Elteir, Heshan Lin, Wu-chun Feng
SAC
2005
ACM
15 years 7 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
CSFW
2009
IEEE
15 years 6 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
CCS
2010
ACM
15 years 1 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
JCM
2008
134views more  JCM 2008»
15 years 2 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang