Sciweavers

501 search results - page 49 / 101
» Redundancy and Diversity in Security
Sort
View
ESORICS
2005
Springer
14 years 1 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
AGENTS
1999
Springer
14 years 8 days ago
Agent Aided Aircraft Maintenance
Aircraft maintenance is performed by mechanics who are required, by regulation, to consult expert engineers for repair instructions and approval. In addition to their own experien...
Onn Shehory, Katia P. Sycara, Gita Sukthankar, Vic...
WEBNET
2001
13 years 9 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...
KAIS
2008
99views more  KAIS 2008»
13 years 8 months ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
INFOCOM
2012
IEEE
11 years 10 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...