Sciweavers

42 search results - page 7 / 9
» Distributing the Cost of Securing a Transportation Infrastru...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
RIVF
2007
13 years 8 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
NORDSEC
2009
Springer
14 years 1 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
ICNP
2002
IEEE
13 years 11 months ago
Service Overlay Networks: SLAs, QoS and Bandwidth Provisioning
We advocate the notion of service overlay network (SON) as an effective means to address some of the issues, in particular, end-to-end QoS, plaguing the current Internet, and to f...
Zhenhai Duan, Zhi-Li Zhang, Yiwei Thomas Hou
IEEEARES
2006
IEEE
14 years 22 days ago
Evaluation of Network Robustness for Given Defense Resource Allocation Strategies
Since the 9/11 terrorist attacks, the effective and efficient protection of critical information infrastructures has become an even more important issue. To enhance network surviv...
Y.-S. Lin, P.-H. Tsang, C.-H. Chen, C.-L. Tseng, Y...