Sciweavers

3452 search results - page 126 / 691
» Secure Data Outsourcing
Sort
View
CCS
2010
ACM
13 years 8 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
CN
2002
87views more  CN 2002»
13 years 10 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 10 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
VTC
2007
IEEE
112views Communications» more  VTC 2007»
14 years 4 months ago
"The Medium is The Message": Secure Communication via Waveform Coding in MIMO Systems
— In this paper, we look at multiple antenna systems and code information on the communication medium itself to improve the link security. In the case of single data stream trans...
Xin Zhou, Persefoni Kyritsi, Patrick C. F. Eggers,...
SIS
2007
13 years 11 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...