Sciweavers

485 search results - page 2 / 97
» Continuous Spatial Authentication
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
VLDB
2007
ACM
138views Database» more  VLDB 2007»
14 years 7 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2010
ACM
190views Database» more  VLDB 2010»
13 years 6 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
VLDB
2009
ACM
147views Database» more  VLDB 2009»
14 years 7 months ago
Authenticated indexing for outsourced spatial databases
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
WIS
2004
13 years 9 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur