Sciweavers

959 search results - page 48 / 192
» Possible and Necessary h-Indices
Sort
View
IWDC
2005
Springer
139views Communications» more  IWDC 2005»
14 years 2 months ago
A New Routing Protocol in Ad Hoc Networks with Unidirectional Links
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc network, it is not ne...
Deepesh Man Shrestha, Young-Bae Ko
POLICY
2005
Springer
14 years 2 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
14 years 2 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier
VLDB
2005
ACM
114views Database» more  VLDB 2005»
14 years 2 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
ASIACRYPT
2004
Springer
14 years 2 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera