Sciweavers

3452 search results - page 70 / 691
» Secure Data Outsourcing
Sort
View
WIOPT
2005
IEEE
14 years 3 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
DSN
2008
IEEE
14 years 4 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
BIOID
2008
183views Biometrics» more  BIOID 2008»
13 years 12 months ago
POLYBIO: Multimodal Biometric Data Acquisition Platform and Security System
Biometrics is the automated method of recognizing a person based on a physiological or behavioural characteristic. Biometric technologies are becoming the foundation of an extensiv...
Anastasis Kounoudes, Nicolas Tsapatsoulis, Zenonas...
MOBIHOC
2006
ACM
14 years 9 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
14 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell