Sciweavers

790 search results - page 118 / 158
» Designated Confirmer Signatures
Sort
View
CCS
2004
ACM
14 years 1 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
LCPC
2004
Springer
14 years 1 months ago
Phase-Based Miss Rate Prediction Across Program Inputs
Previous work shows the possibility of predicting the cache miss rate (CMR) for all inputs of a program. However, most optimization techniques need to know more than the miss rate ...
Xipeng Shen, Yutao Zhong, Chen Ding
ACSC
2003
IEEE
14 years 1 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
SIBGRAPI
2003
IEEE
14 years 1 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
TRUST
2010
Springer
14 years 24 days ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li