Sciweavers

1510 search results - page 89 / 302
» Secure Distributed Data Aggregation
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
PDPTA
2007
13 years 11 months ago
An Implementation of Parallel File Distribution in an Agent Hierarchy
AgentTeamwork coordinates parallel job execution in a hierarchy of mobile agents. A collection of specialized agents are deployed to remote sites including multiple clusters so as...
Jumpei Miyauchi, Munehiro Fukuda, Joshua Phillips
JSAC
2007
119views more  JSAC 2007»
13 years 10 months ago
Cooperative routing for distributed detection in large sensor networks
— In this paper, the detection of a correlated Gaussian field using a large multi-hop sensor network is investigated. A cooperative routing strategy is proposed by introducing a...
Youngchul Sung, Saswat Misra, Lang Tong, Anthony E...
MOBISYS
2007
ACM
14 years 9 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
PODS
2000
ACM
112views Database» more  PODS 2000»
14 years 2 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...