Sciweavers

2282 search results - page 400 / 457
» Distributed Cryptographic Computing on Grid
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 11 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 8 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
ASIACRYPT
2011
Springer
12 years 10 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
WISEC
2009
ACM
14 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
AINA
2008
IEEE
14 years 4 months ago
An Architecture for Mobility Support in a Next-Generation Internet
—The current internetworking architecture presents some limitations to naturally support mobility, security and multihoming. Among the limitations, the IP semantic overload seems...
Walter Wong, Rodolfo Villaca, Luciano Paula, Rafae...