Sciweavers

403 search results - page 44 / 81
» Efficient Algorithms for Secure Multicast key Management
Sort
View
BTW
2009
Springer
114views Database» more  BTW 2009»
14 years 3 days ago
Efficient Verification of B-tree Integrity
: The integrity of B-tree structures can become compromised for many reasons. Since these inconsistencies manifest themselves in unpredictable ways, all commercial database managem...
Goetz Graefe, R. Stonecipher
CODASPY
2012
12 years 4 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
CARDIS
2006
Springer
146views Hardware» more  CARDIS 2006»
14 years 16 days ago
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented effici...
François-Xavier Standaert, Gilles Piret, Ne...
MUE
2007
IEEE
120views Multimedia» more  MUE 2007»
14 years 3 months ago
Design and Implementation of Secure Communication Channels over UPnP Networks
The scale of smart living spaces can be varied from small, e.g. a household, to large, e.g. a building or a campus, scales. As the scale of the space increases, we can expect that...
Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed