Sciweavers

331 search results - page 17 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
ESAS
2005
Springer
15 years 3 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
CCS
2006
ACM
15 years 1 months ago
Data collection with self-enforcing privacy
Consider a pollster who wishes to collect private, sensitive data from a number of distrustful individuals. How might the pollster convince the respondents that it is trustworthy?...
Philippe Golle, Frank McSherry, Ilya Mironov
96
Voted
DAC
2007
ACM
15 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
81
Voted
RECOMB
2001
Springer
15 years 1 months ago
Extracting structural information using time-frequency analysis of protein NMR data
High-throughput, data-directed computational protocols for Structural Genomics (or Proteomics) are required in order to evaluate the protein products of genes for structure and fu...
Christopher James Langmead, Bruce Randall Donald
83
Voted
IPSN
2007
Springer
15 years 3 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava