Sciweavers

14824 search results - page 2946 / 2965
» Security - Introduction
Sort
View
139
Voted
ASIACRYPT
2010
Springer
15 years 20 days ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
152
Voted
COMPSAC
2010
IEEE
15 years 19 days ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
161
Voted
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
15 years 19 days ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
131
Voted
GLOBECOM
2010
IEEE
15 years 19 days ago
Passively Controllable Smart Antennas
Abstract-- This work deals with devising a secure, powerefficient, beam-steerable and on-chip transmission system for wireless sensor networks. A passively controllable smart (PCS)...
Javad Lavaei, Aydin Babakhani, Ali Hajimiri, John ...
128
Voted
MOBIHOC
2010
ACM
15 years 16 days ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
« Prev « First page 2946 / 2965 Last » Next »