Sciweavers

726 search results - page 80 / 146
» Securing XML data in third-party distribution systems
Sort
View
EUROPAR
2007
Springer
14 years 2 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
13 years 11 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
DGO
2007
150views Education» more  DGO 2007»
13 years 9 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
WOA
2010
13 years 5 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
SIGMOD
2007
ACM
146views Database» more  SIGMOD 2007»
14 years 8 months ago
Distributed query evaluation with performance guarantees
Partial evaluation has recently proven an effective technique for evaluating Boolean XPath queries over a fragmented tree that is distributed over a number of sites. What left ope...
Gao Cong, Wenfei Fan, Anastasios Kementsietsidis