Sciweavers

978 search results - page 16 / 196
» Knowledge, Probability, and Adversaries
Sort
View
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
11 years 9 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
SSS
2007
Springer
102views Control Systems» more  SSS 2007»
14 years 1 months ago
Secure and Self-stabilizing Clock Synchronization in Sensor Networks
Abstract. In sensor networks, correct clocks have arbitrary starting offsets and nondeterministic fluctuating skews. We consider an adversary that aims at tampering with the cloc...
Jaap-Henk Hoepman, Andreas Larsson, Elad Michael S...
TIT
2008
106views more  TIT 2008»
13 years 7 months ago
Byzantine Modification Detection in Multicast Networks With Random Network Coding
This paper gives an information theoretic approach for detecting Byzantine modifications in networks employing random linear network coding. Each exogenous source packet is augmen...
Tracey Ho, Ben Leong, Ralf Koetter, Muriel M&eacut...
IJACT
2010
90views more  IJACT 2010»
13 years 2 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
ECIS
2004
13 years 8 months ago
Conflicts in Knowledge Management: Visiting the Hidden Partner
As knowledge gains a reputation for being a critical resource in the information-intensive economy, organizations have doubled their efforts in trying to extract value from knowle...
Chee-Wee Tan, Shan Ling Pan, Eric Tze Kuan Lim, Ca...