To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...