Sciweavers

632 search results - page 80 / 127
» Two Facets of Authentication
Sort
View
IPSN
2005
Springer
14 years 2 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
ESORICS
2004
Springer
14 years 2 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
PODC
1994
ACM
14 years 27 days ago
Using Belief to Reason about Cache Coherence
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 9 months ago
Ownership protection of shape datasets with geodesic distance preservation
Protection of one's intellectual property is a topic with important technological and legal facets. The significance of this issue is amplified nowadays due to the ease of da...
Michail Vlachos, Claudio Lucchese, Deepak Rajan, P...