Sciweavers

963 search results - page 142 / 193
» A Solution for Data Inconsistency in Data Integration
Sort
View
CAISE
2006
Springer
14 years 20 days ago
A Tool for Semi-Automated Semantic Schema Mapping: Design and Implementation
Recently, schema mapping has found considerable interest in both research and practice. Determining matching components of database or XML schemas is needed in many applications, e...
Dimitris Manakanatas, Dimitris Plexousakis
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
14 years 20 days ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
CCS
2008
ACM
13 years 11 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
NETWORKING
2008
13 years 10 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha