Sciweavers

1795 search results - page 314 / 359
» Security Models and Information Flow
Sort
View
129
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 3 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
150
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
110
Voted
GIL
2009
15 years 1 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
153
Voted
AISS
2010
165views more  AISS 2010»
15 years 1 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
158
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim