Sciweavers

480 search results - page 73 / 96
» Anonymous Transactions in Computer Networks
Sort
View
CCS
2008
ACM
13 years 9 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
ICDCSW
2006
IEEE
14 years 1 months ago
Benchmarking a Semantic Web Service Architecture for Fault-tolerant B2B Integration
With the development and maturity of ServiceOriented Architectures (SOA) to support business-tobusiness transactions, organizations are implementing Web services to expose their p...
Jorge Cardoso
ICDCSW
2003
IEEE
14 years 26 days ago
An Adaptive Object Allocation and Replication Algorithm in Distributed Databases
In a Distributed Database System (DDBS), transactions on objects can be read requests or write requests in a random manner. The replication algorithm of objects critically affects...
Wujuan Lin, Bharadwaj Veeravalli
PODC
1996
ACM
13 years 11 months ago
Atomicity in Electronic Commerce
There is tremendous demand for the ability to be able to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large var...
J. D. Tygar