Sciweavers

1351 search results - page 225 / 271
» Trust in Anonymity Networks
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
15 years 11 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
WWW
2009
ACM
15 years 10 months ago
Retaining personal expression for social search
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Praphul Chandra, Ajay Gupta
MOBIHOC
2009
ACM
15 years 10 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...
CSE
2009
IEEE
15 years 4 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu
GLOBECOM
2007
IEEE
15 years 4 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...