Sciweavers

554 search results - page 15 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
EDBT
2009
ACM
98views Database» more  EDBT 2009»
14 years 2 months ago
A runtime approach to model-independent schema and data translation
A runtime approach to model-generic translation of schema and data is proposed. It is based on our previous work on MIDST, a platform conceived to perform translations in an off-...
Paolo Atzeni, Luigi Bellomarini, Francesca Bugiott...
NTMS
2008
IEEE
14 years 1 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
TSMC
2008
162views more  TSMC 2008»
13 years 7 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
TSP
2008
157views more  TSP 2008»
13 years 7 months ago
A Two-Stage Approach to Estimate the Angles of Arrival and the Angular Spreads of Locally Scattered Sources
We propose a new two-stage approach to estimate the nominal angles of arrival (AoAs) and the angular spreads (ASs) of multiple locally scattered sources using a uniform linear arra...
Mehrez Souden, Sofiène Affes, Jacob Benesty