Sciweavers

548 search results - page 14 / 110
» Secure peer sampling
Sort
View
35
Voted
VLDB
2004
ACM
57views Database» more  VLDB 2004»
15 years 3 months ago
An Electronic Patient Record "on Steroids": Distributed, Peer-to-Peer, Secure and Privacy-conscious
Serge Abiteboul, Bogdan Alexe, Omar Benjelloun, Bo...
HICSS
2002
IEEE
97views Biometrics» more  HICSS 2002»
15 years 3 months ago
A Secure Platform for Peer-to-Peer Computing in the Internet
WooYoung Kim, Sven Graupner, Akhil Sahai
74
Voted
WSC
2004
14 years 12 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 5 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi