Sciweavers

5484 search results - page 937 / 1097
» Almost-Everywhere Secure Computation
Sort
View
ICDCS
2002
IEEE
15 years 9 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
IPPS
2002
IEEE
15 years 9 months ago
Semi-User-Level Communication Architecture
This paper introduces semi-user-level communication architecture, a new high-performance light-weighted communication architecture for inter-node communication of clusters. Differ...
Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu
NDSS
2002
IEEE
15 years 9 months ago
Performance Analysis of TLS Web Servers
TLS is the protocol of choice for securing today’s ecommerce and online transactions, but adding TLS to a web server imposes a significant overhead relative to an insecure web ...
Cristian Coarfa, Peter Druschel, Dan S. Wallach
EDCC
2010
Springer
15 years 9 months ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
HAIS
2010
Springer
15 years 9 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...