Sciweavers

3451 search results - page 216 / 691
» Security of Backup Data
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
IMCS
2007
77views more  IMCS 2007»
15 years 4 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
JCM
2007
101views more  JCM 2007»
15 years 4 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 11 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
ICDCSW
2007
IEEE
15 years 11 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage