Sciweavers

2081 search results - page 108 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
P2P
2006
IEEE
119views Communications» more  P2P 2006»
14 years 2 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
SPAA
2010
ACM
14 years 1 months ago
Brief announcement: byzantine agreement with homonyms
In this work, we address Byzantine agreement in a message passing system with homonyms, i.e. a system with a number l of authenticated identities that is independent of the total ...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
CIKM
2009
Springer
14 years 3 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
SSS
2005
Springer
119views Control Systems» more  SSS 2005»
14 years 2 months ago
Self-stabilization of Byzantine Protocols
Awareness of the need for robustness in distributed systems increases as distributed systems become integral parts of day-to-day systems. Self-stabilizing while tolerating ongoing ...
Ariel Daliot, Danny Dolev
ICDCSW
2005
IEEE
14 years 2 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob