Sciweavers

298 search results - page 13 / 60
» Computer security: quality rather than quantity
Sort
View
ACL
2011
13 years 1 months ago
Adjoining Tree-to-String Translation
We introduce synchronous tree adjoining grammars (TAG) into tree-to-string translation, which converts a source tree to a target string. Without reconstructing TAG derivations exp...
Yang Liu, Qun Liu, Yajuan Lü
ACSAC
2007
IEEE
14 years 1 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
CCS
2010
ACM
13 years 10 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper

Publication
145views
13 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 4 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich