Sciweavers

3451 search results - page 118 / 691
» Security of Backup Data
Sort
View
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
15 years 4 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
VTC
2007
IEEE
112views Communications» more  VTC 2007»
15 years 10 months ago
"The Medium is The Message": Secure Communication via Waveform Coding in MIMO Systems
— In this paper, we look at multiple antenna systems and code information on the communication medium itself to improve the link security. In the case of single data stream trans...
Xin Zhou, Persefoni Kyritsi, Patrick C. F. Eggers,...
SIS
2007
15 years 5 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 10 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...
GRC
2007
IEEE
15 years 10 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...