Sciweavers

169 search results - page 27 / 34
» A secure role-based address allocation and distribution mech...
Sort
View
CCS
2004
ACM
14 years 24 days ago
On the effectiveness of address-space randomization
Address-space randomization is a technique used to fortify systems against bu er over ow attacks. The idea is to introduce arti cial diversity by randomizing the memory location o...
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh...
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 1 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ICDCS
1996
IEEE
13 years 11 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
POPL
2000
ACM
13 years 11 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
SENSYS
2009
ACM
14 years 2 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...