To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Abstract— Network monitoring and measurement is commonly regarded as an essential function for understanding, managing and improving the performance and security of network infra...