Sciweavers

5484 search results - page 209 / 1097
» Almost-Everywhere Secure Computation
Sort
View
MOBIHOC
2006
ACM
16 years 4 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
P2P
2008
IEEE
15 years 11 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...
LCN
1999
IEEE
15 years 9 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
SAC
2005
ACM
15 years 10 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon