Sciweavers

90 search results - page 12 / 18
» Fault-Tolerant Aggregate Signatures
Sort
View
IJMSO
2006
105views more  IJMSO 2006»
13 years 8 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
ADHOCNOW
2010
Springer
13 years 10 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
CCS
2008
ACM
13 years 10 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
JAMIA
2011
94views more  JAMIA 2011»
12 years 11 months ago
Protein-network modeling of prostate cancer gene signatures reveals essential pathways in disease recurrence
Objective Uncovering the dominant molecular deregulation among the multitude of pathways implicated in aggressive prostate cancer is essential to intelligently developing targeted...
James L. Chen, Jianrong Li, Walter M. Stadler, Yve...
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
14 years 10 months ago
Proof Sketches: Verifiable In-Network Aggregation
Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In...
Minos N. Garofalakis, Joseph M. Hellerstein, Petro...