Sciweavers

3451 search results - page 16 / 691
» Security of Backup Data
Sort
View
102
Voted
CCS
2011
ACM
14 years 3 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
ESORICS
2007
Springer
15 years 10 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
CCS
2010
ACM
15 years 10 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
127
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu
116
Voted
SP
2006
IEEE
129views Security Privacy» more  SP 2006»
15 years 10 months ago
Practical Inference Control for Data Cubes (Extended Abstract)
Yingjiu Li, Haibing Lu, Robert H. Deng