Sciweavers

91 search results - page 6 / 19
» Survivable key compromise in software update systems
Sort
View
MOBIHOC
2008
ACM
15 years 9 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
EDBTW
2004
Springer
15 years 3 months ago
L-Tree: A Dynamic Labeling Structure for Ordered XML Data
With the ever growing use of XML as a data representation format, we see an increasing need for robust, high performance XML database systems. While most of the recent work focuses...
Yi Chen, George A. Mihaila, Rajesh Bordawekar, Sri...
CCS
2008
ACM
14 years 11 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
CDVE
2004
Springer
120views Visualization» more  CDVE 2004»
15 years 3 months ago
Constructing a Global and Integral Model of Business Management Using a CBR System
Abstract. Knowledge has become the most strategic resource in the new business environment. A case-based reasoning system, which incorporates a novel clustering and retrieval metho...
Emilio Corchado, Juan M. Corchado, Lourdes S&aacut...
IEEEARES
2006
IEEE
15 years 3 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie