Sciweavers

3451 search results - page 34 / 691
» Security of Backup Data
Sort
View
COMPSAC
2009
IEEE
15 years 4 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi
ANCS
2007
ACM
15 years 1 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
PET
2012
Springer
13 years 4 days ago
Fault-Tolerant Privacy-Preserving Statistics
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation m...
Marek Jawurek, Florian Kerschbaum
ESORICS
2009
Springer
15 years 4 months ago
The UNESCO Chair in Data Privacy Research in Vehicular Networks
An overview of the activities of the UNESCO Chair in Data Privacy is ï¬rst given. One of these activities is research. We focus on the research conducted to conciliate security an...
Josep Domingo-Ferrer