Sciweavers

3451 search results - page 219 / 691
» Security of Backup Data
Sort
View
120
Voted
SERP
2008
15 years 6 months ago
Use of Data Recharging for Personal Information Environment
In this paper we provide a new way of defining personal information environment and its framework using data recharging. Using this new approach, human intervention can significant...
Atif Farid Mohammad
141
Voted
COLCOM
2007
IEEE
15 years 11 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
SAC
2004
ACM
15 years 10 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 10 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
140
Voted
CN
2006
62views more  CN 2006»
15 years 5 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda