Sciweavers

756 search results - page 91 / 152
» Leveraging the CAPTCHA Problem
Sort
View
FOCS
2006
IEEE
14 years 3 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
GLOBECOM
2006
IEEE
14 years 3 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar
ICDCS
2006
IEEE
14 years 3 months ago
Application-Tailored Cache Consistency for Wide-Area File Systems
The inability to perform optimizations based on application-specific information presents a hurdle to the deployment of pervasive LAN file systems across WAN environments. This pa...
Ming Zhao 0002, Renato J. O. Figueiredo
INFOCOM
2006
IEEE
14 years 3 months ago
Using Repeated Games to Design Incentive-Based Routing Systems
Abstract— Incorporating pricing information in routing systems has been explored in various contexts and fashions. In this paper we examine certain fundamental properties importa...
Michael Afergan
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
14 years 3 months ago
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encrypt...
Chenyu Yan, Daniel Englender, Milos Prvulovic, Bri...