Sciweavers

224 search results - page 8 / 45
» Secrecy in Untrusted Networks
Sort
View
ICASSP
2011
IEEE
12 years 10 months ago
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
We investigate secure communications for a four-node relayeavesdropper channel with multiple data stream transmission, assuming that the eavesdropper’s channel state information...
Jing Huang, A. Lee Swindlehurst
NDSS
2009
IEEE
14 years 1 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
HOTOS
1999
IEEE
13 years 11 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
EJWCN
2011
119views more  EJWCN 2011»
13 years 1 months ago
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks
Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, A...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
13 years 11 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig