Sciweavers

1510 search results - page 87 / 302
» Secure Distributed Data Aggregation
Sort
View
ICC
2008
IEEE
168views Communications» more  ICC 2008»
14 years 4 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
JAMIA
2011
68views more  JAMIA 2011»
13 years 29 days ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
WISTP
2010
Springer
13 years 8 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
HPCC
2007
Springer
14 years 4 months ago
File and Memory Security Analysis for Grid Systems
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferre...
Unnati Thakore, Lorie M. Liebrock
COLCOM
2007
IEEE
14 years 4 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham