Sciweavers

2315 search results - page 281 / 463
» Does EigenPalm work
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
INFOCOM
2012
IEEE
11 years 10 months ago
DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks
— Reliability and energy efficiency are critical issues in wireless sensor networks. In this work, we study Delay-bounded Energy-constrained Adaptive Routing (DEAR) problem with...
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Cho...
INFOCOM
2012
IEEE
11 years 10 months ago
SageShift: Managing SLAs for highly consolidated cloud
– Maximizing consolidation ratio, the number of virtual machines (VMs) in a physical machine, without violating customers’ SLAs is an important goal in the cloud. We show that ...
Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim
INFOCOM
2012
IEEE
11 years 10 months ago
Robust multi-source network tomography using selective probes
—Knowledge of a network’s topology and internal characteristics such as delay times or losses is crucial to maintain seamless operation of network services. Network tomography ...
Akshay Krishnamurthy, Aarti Singh
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart