Sciweavers

1449 search results - page 118 / 290
» Secure and Efficient Metering
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
SIGKDD
2002
90views more  SIGKDD 2002»
15 years 4 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
PERCOM
2007
ACM
16 years 4 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
MUE
2008
IEEE
161views Multimedia» more  MUE 2008»
15 years 10 months ago
A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network
Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics o...
Yi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu ...