Sciweavers

277 search results - page 26 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
WIOPT
2005
IEEE
14 years 2 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
FAST
2003
13 years 10 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
EENERGY
2010
13 years 11 months ago
Policy-driven distributed and collaborative demand response in multi-domain commercial buildings
Enabling a sophisticated Demand Response (DR) framework, whereby individual consumers adapt their electricity consumption in response to price variations, is a major objective of ...
Archan Misra, Henning Schulzrinne
NOSSDAV
2001
Springer
14 years 28 days ago
Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination
The demand for streaming multimedia applications is growing at an incredible rate. In this paper, we propose Bayeux, an efficient application-level multicast system that scales t...
Shelley Zhuang, Ben Y. Zhao, Anthony D. Joseph, Ra...