Sciweavers

3451 search results - page 140 / 691
» Security of Backup Data
Sort
View
ESORICS
2009
Springer
16 years 5 months ago
Keep a Few: Outsourcing Data While Maintaining Confidentiality
We put forward a novel paradigm for preserving privacy in data outsourcing which departs from encryption. The basic idea behind our proposal is to involve the owner in storing a li...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
SAC
2004
ACM
15 years 10 months ago
Protected transmission of biometric user authentication data for oncard-matching
Since fingerprint data are no secrets but of public nature, the verification data transmitted to a smartcard for oncardmatching need protection by appropriate means in order to ...
Ulrich Waldmann, Dirk Scheuermann, Claudia Eckert
JCM
2010
98views more  JCM 2010»
15 years 2 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
ISCAPDCS
2004
15 years 5 months ago
Mobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of m...
J. Todd McDonald, Alec Yasinsac, Willard C. Thomps...