Sciweavers

525 search results - page 80 / 105
» Threshold Schemes with Disenrollment
Sort
View
CCS
2004
ACM
15 years 5 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
CASES
2003
ACM
15 years 5 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
WSNA
2003
ACM
15 years 5 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
EUROMICRO
2000
IEEE
15 years 4 months ago
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest
This paper suggests a novel image compression scheme, using the discrete wavelet transformation (DWT) and the fuzzy c-means clustering technique. The goal is to achieve higher com...
Dimitris A. Karras, S. A. Karkanis, Dimitrios E. M...
ECR
2006
81views more  ECR 2006»
14 years 11 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang