Sciweavers

1597 search results - page 165 / 320
» Mental Models of Computer Security
Sort
View
142
Voted
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
15 years 4 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
ICCV
2011
IEEE
14 years 4 months ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
140
Voted
EUC
2008
Springer
15 years 6 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
137
Voted
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 4 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
134
Voted
ISORC
2008
IEEE
15 years 11 months ago
QoS Aware Dependable Distributed Stream Processing
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream ...
Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sand...