Sciweavers

1120 search results - page 56 / 224
» Securely sharing neuroimagery
Sort
View
85
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 7 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
ADHOCNOW
2010
Springer
15 years 2 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
96
Voted
ITIIS
2010
128views more  ITIIS 2010»
14 years 11 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
104
Voted
SOUPS
2010
ACM
15 years 23 days ago
The impact of social navigation on privacy policy configuration
Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been app...
Andrew Besmer, Jason Watson, Heather Richter Lipfo...
109
Voted
CCS
2009
ACM
16 years 1 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...