Sciweavers

480 search results - page 82 / 96
» Anonymous Transactions in Computer Networks
Sort
View
WISEC
2010
ACM
13 years 5 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
SIES
2007
IEEE
14 years 1 months ago
A Timed Multitasking Architecture for Distributed Embedded Systems
— The paper presents a software architecture for Distributed Timed Multitasking - a new model of computation that can be used to engineer open, and the same time, predictable emb...
Christo Angelov, Jesper Berthing
NDSS
2002
IEEE
14 years 13 days ago
Performance Analysis of TLS Web Servers
TLS is the protocol of choice for securing today’s ecommerce and online transactions, but adding TLS to a web server imposes a significant overhead relative to an insecure web ...
Cristian Coarfa, Peter Druschel, Dan S. Wallach
NDSS
2002
IEEE
14 years 13 days ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
IPPS
2000
IEEE
13 years 12 months ago
Reducing Ownership Overhead for Load-Store Sequences in Cache-Coherent Multiprocessors
Parallel programs that modify shared data in a cachecoherent multiprocessor with a write-invalidate coherence protocol create ownership overhead in the form of ownership acquisiti...
Jim Nilsson, Fredrik Dahlgren