Sciweavers

726 search results - page 115 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 8 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
LCN
2008
IEEE
14 years 2 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
ADHOCNOW
2005
Springer
14 years 1 months ago
Probability Distributions for Channel Utilisation
Sensor nets have many undisputed fields of application. A paradigm of communication is the use of one control channel in the MAC layer. We challenge this paradigm for nodes with v...
Christian Schindelhauer, Kerstin Voß
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
LCTRTS
2000
Springer
13 years 11 months ago
Reordering Memory Bus Transactions for Reduced Power Consumption
Low energy consumption is becoming the primary design consideration for battery-operated and portable embedded systems, such as personal digital assistants, digital still and movi...
Bruce R. Childers, Tarun Nakra