Showing 1609–1620 of 1912 results

  • Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact

    0 out of 5
    4,500

    Secure Data Aggregation in Wireless SensorNetworks: Filtering out the Attacker?s Impact Abstract?Wireless sensor networks (WSNs) are increasingly used in many applications, such as volcano and fire monitoring, urban sensing, and perimeter surveillance. In a large WSN, in-network data aggregation (i.e., combining partial results at intermediate nodes during message routing) significantly reduces the amount of communication…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract?Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods such…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. Due to limited computational power and energy resources, aggregation of data from multiple sensor nodes done at the aggregating node is usually accomplished by simple methods…

  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

    0 out of 5
    4,500

    Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Abstract? Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. At present, due to limited computational power and energy resources of sensor nodes, aggregation of data from multiple sensor nodes done at the aggregating node is…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks   Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by…

  • Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    0 out of 5
    4,500

    Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Abstract?Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers…

  • Secure Deduplication with Efficient and Reliable Convergent Key Management

    Secure Deduplication with Efficient and Reliable Convergent Key Management

    0 out of 5
    4,500

    Secure Deduplication with Efficient and Reliable Convergent Key Management Abstract?Secure Deduplication with Efficient and Reliable Convergent Key Management. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. Promising as it is, an arising challenge is to perform secure…

  • Secure Distributed Deduplication Systems with Improved Reliability

    Secure Distributed Deduplication Systems with Improved Reliability

    0 out of 5
    4,500

    Secure Distributed Deduplication Systems with Improved Reliability Abstract? Secure Distributed Deduplication Systems with Improved Reliability. Data deduplication is a technique for eliminating duplicate copies of data, and has been widely used in cloud storage to reduce storage space and upload bandwidth. However, there is only one copy for each ?le stored in cloud even if…

  • Secure file transfer System

    Secure file transfer System

    0 out of 5
    4,500

    Secure file transfer System Abstract?Secure file transfer System. The Iowa Campaign Finance Disclosure project (ICFD) is a pilot effort to develop a simple and secure way for candidates running for public office or Political Action Committees (PACs) to disclose required financial information. In the prototype system described in this paper, a candidate or PAC can…

  • Secure kNN Query Processing in  Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments Abstract?Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes, ongoing events, etc. Entities specialized in various areas of interest…

  • Secure kNN Query Processing in Untrusted Cloud Environments

    Secure kNN Query Processing in Untrusted Cloud Environments

    0 out of 5
    4,500

    Secure kNN Query Processing in Untrusted Cloud Environments   Abstract? Secure kNN Query Processing in Untrusted Cloud Environments. Mobile devices with geo-positioning capabilities (e.g., GPS) enable users to access information that is relevant to their present location. Users are interested in querying about points of interest (POI) in their physical proximity, such as restaurants, cafes,…

  • Secure Logging As a Service -Delegating Log Management to the Cloud

    Secure Logging As a Service -Delegating Log Management to the Cloud

    0 out of 5
    4,500

    Secure Logging As a Service -Delegating Log Management to the Cloud Abstract?Secure Logging As a Service -Delegating Log Management to the Cloud. Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be…

End of content

End of content