Data protection in multipath WSNs
Texte intégral
Documents relatifs
Abstract: In this paper, we examine a secret sharing scheme based on polynomials over finite fields.. In the presented scheme, the shares can be used for the reconstruction of
The Relevant Information Frame - RIF - architecture proposed here decreases the number of messages sent by selecting the most relevant data items in a node and disseminating them in
Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l’Europe - 38334
In the simplest case, we can align shares by observing point queries, which return only one share from each server. If the colluding servers all observe an isolated request for a
As we mentioned before, if we only look for a short time solution, the fully explicit scheme for the nonlinear convection term may be analyzed accordingly as well.. Moreover,
Cur- rent access control systems are based on a predened set of static rules in order to prohibit access to certain elds of a data repository; these access control rules cannot
This paper describes the visualization pipeline, developed by the authors, based on 3D scatter plot diagram with colored distances between data objects in multidimensional
Keywords— big data, data management, HDF5, auditory, outer hair cell, OHC, application ontology..