Sciweavers

948 search results - page 182 / 190
» Attacking cryptographic schemes based on
Sort
View
MADNES
2005
Springer
14 years 1 months ago
ARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A ...
Suk-Bok Lee, Yoon-Hwa Choi
WS
2004
ACM
14 years 1 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
PODS
2010
ACM
184views Database» more  PODS 2010»
14 years 29 days ago
Universally optimal privacy mechanisms for minimax agents
A scheme that publishes aggregate information about sensitive data must resolve the trade-off between utility to information consumers and privacy of the database participants. D...
Mangesh Gupte, Mukund Sundararajan
NGITS
1999
Springer
14 years 4 days ago
Multiplex: A Formal Model for Multidatabases and Its Implementation
The integration of information from multiple databases has been an enduring subject of research for over 20 years, and many different solutions have been attempted or proposed. Mis...
Amihai Motro
JSAC
2006
111views more  JSAC 2006»
13 years 7 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras