Sciweavers

364 search results - page 35 / 73
» E-Voting System Security Optimization
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
13 years 8 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
OSDI
2006
ACM
14 years 8 months ago
Type-Safe Disks
We present the notion of a type-safe disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layer...
Gopalan Sivathanu, Swaminathan Sundararaman, Erez ...
WISEC
2010
ACM
14 years 1 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
AISS
2010
165views more  AISS 2010»
13 years 6 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
TIFS
2010
123views more  TIFS 2010»
13 years 6 months ago
A new framework for adaptive multimodal biometrics management
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to ensure the optimal performance for the desired level of security. The adaptive c...
Ajay Kumar, Vivek Kanhangad, David Zhang