Sciweavers

6907 search results - page 296 / 1382
» Securing distributed adaptation
Sort
View
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
14 years 4 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
ICASSP
2010
IEEE
15 years 4 months ago
Revisiting the security of speaker verification systems against imposture using synthetic speech
In this paper, we investigate imposture using synthetic speech. Although this problem was first examined over a decade ago, dramatic improvements in both speaker verification (S...
Phillip L. De Leon, Vijendra Raj Apsingekar, Micha...
INFOCOM
2010
IEEE
15 years 2 months ago
SafeQ: Secure and Efficient Query Processing in Sensor Networks
The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widel...
Fei Chen, Alex X. Liu
CN
2007
117views more  CN 2007»
15 years 4 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 10 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith