Sciweavers

5665 search results - page 1049 / 1133
» Introduction to Computer Security
Sort
View
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 10 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 10 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
ISCAPDCS
2004
13 years 10 months ago
A Reputation-based Trust Management in Peer-to-Peer Network Systems
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
ISCAPDCS
2001
13 years 10 months ago
Tolerating Transient Faults through an Instruction Reissue Mechanism
In this paper, we propose a fault-tolerant mechanism for microprocessors, which detects transient faults and recovers from them. There are two driving force to investigate fault-t...
Toshinori Sato, Itsujiro Arita
ATAL
2010
Springer
13 years 10 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
« Prev « First page 1049 / 1133 Last » Next »