Sciweavers

2699 search results - page 442 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Duty cycling is often used to reduce the energy consumption caused by idle listening in Wireless Sensor Networks (WSNs). Most studies on WSN protocols define a common duty cycle va...
Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wen...
HPCA
2012
IEEE
12 years 3 months ago
SCD: A scalable coherence directory with flexible sharer set encoding
Large-scale CMPs with hundreds of cores require a directory-based protocol to maintain cache coherence. However, previously proposed coherence directories are hard to scale beyond...
Daniel Sanchez, Christos Kozyrakis
SAC
2010
ACM
14 years 2 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
ATAL
2009
Springer
14 years 2 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
14 years 2 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary