Sciweavers

2334 search results - page 387 / 467
» How are Real Grids Used
Sort
View
102
Voted
SP
2006
IEEE
15 years 9 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...
140
Voted
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 9 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
136
Voted
ICALT
2005
IEEE
15 years 9 months ago
Designing Web-Based Interactive Learning Environments for Problem-Based Learning
Problem-based learning is a pedagogical strategy that centers learning activities around the investigation and development of solutions to complex and ill-structured authentic pro...
Lin Qiu, Christopher Riesbeck
123
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
INFOCOM
2005
IEEE
15 years 9 months ago
Exploiting heterogeneity in sensor networks
—The presence of heterogeneous nodes (i.e., nodes with an enhanced energy capacity or communication capability) in a sensor network is known to increase network reliability and l...
Mark D. Yarvis, Nandakishore Kushalnagar, Harkirat...