Sciweavers

574 search results - page 26 / 115
» Responsive Security for Stored Data
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
TWC
2011
417views more  TWC 2011»
13 years 1 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 6 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
14 years 16 days ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 4 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...