Sciweavers

1510 search results - page 159 / 302
» Secure Distributed Data Aggregation
Sort
View
SIGMOD
2011
ACM
297views Database» more  SIGMOD 2011»
14 years 5 months ago
Graph cube: on warehousing and OLAP multidimensional networks
We consider extending decision support facilities toward large sophisticated networks, upon which multidimensional attributes are associated with network entities, thereby forming...
Peixiang Zhao, Xiaolei Li, Dong Xin, Jiawei Han
125
Voted
ICALP
2001
Springer
15 years 6 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
CCS
2006
ACM
15 years 6 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
105
Voted
CORR
2002
Springer
93views Education» more  CORR 2002»
15 years 2 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 8 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...