Sciweavers

3451 search results - page 208 / 691
» Security of Backup Data
Sort
View
89
Voted
EV
2008
63views Hardware» more  EV 2008»
15 years 6 months ago
Secure Remote Voter Registration
: Voter registration is an important issue in election processes. In order to protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. ...
Victor Morales-Rocha, Jordi Puiggali, Miguel Soria...
ESORICS
2009
Springer
16 years 5 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
SECON
2007
IEEE
15 years 11 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 11 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
BIOSURVEILLANCE
2007
Springer
15 years 11 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...