Sciweavers

1510 search results - page 89 / 302
» Secure Distributed Data Aggregation
Sort
View
CSFW
2005
IEEE
15 years 7 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
PDPTA
2007
15 years 3 months ago
An Implementation of Parallel File Distribution in an Agent Hierarchy
AgentTeamwork coordinates parallel job execution in a hierarchy of mobile agents. A collection of specialized agents are deployed to remote sites including multiple clusters so as...
Jumpei Miyauchi, Munehiro Fukuda, Joshua Phillips
JSAC
2007
119views more  JSAC 2007»
15 years 2 months ago
Cooperative routing for distributed detection in large sensor networks
— In this paper, the detection of a correlated Gaussian field using a large multi-hop sensor network is investigated. A cooperative routing strategy is proposed by introducing a...
Youngchul Sung, Saswat Misra, Lang Tong, Anthony E...
119
Voted
MOBISYS
2007
ACM
16 years 1 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
PODS
2000
ACM
112views Database» more  PODS 2000»
15 years 6 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...