Sciweavers

1663 search results - page 100 / 333
» Computer Security in the Real World
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
IPTPS
2004
Springer
14 years 2 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières
ACMSE
2009
ACM
14 years 3 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
SC
1994
ACM
14 years 1 months ago
PARAMICS - moving vehicles on the connection machine
PARAMICS is a PARAllel MICroscopic Traffic Simulator which is, to our knowledge, the most powerful of its type in the world. The simulator can model around 200,000 vehicles on aro...
Gordon Cameron, Brian J. N. Wylie, David McArthur
ACMACE
2011
ACM
12 years 9 months ago
WeQuest: scalable alternate reality games through end-user content authoring
Alternate Reality Games (ARGs) are interactive narrative experiences that engage the player by layering a fictional world over the real world. Mobile ARG stories are often geo-sp...
Andrew Macvean, Sanjeet Hajarnis, Brandon Headrick...