Sciweavers

1347 search results - page 178 / 270
» Towards a Secure Data Stream Management System
Sort
View
PIMRC
2008
IEEE
15 years 11 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
15 years 2 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
SC
2004
ACM
15 years 10 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
CCS
2011
ACM
14 years 5 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...
133
Voted
USENIX
2003
15 years 6 months ago
Kernel Support for Faster Web Proxies
This paper proposes two mechanisms for reducing the communication-related overheads of Web applications. One mechanism is user-level connection tracking, which allows an applicati...
Marcel-Catalin Rosu, Daniela Rosu