Sciweavers

347 search results - page 8 / 70
» On private computation in incomplete networks
Sort
View
PVLDB
2011
13 years 2 months ago
Personalized Social Recommendations - Accurate or Private?
With the recent surge of social networks such as Facebook, new forms of recommendations have become possible – recommendations that rely on one’s social connections in order t...
Ashwin Machanavajjhala, Aleksandra Korolova, Atish...
IMC
2006
ACM
14 years 1 months ago
BGP convergence in virtual private networks
Multi-protocol label switching (MPLS) virtual private networks (VPNs) have had significant and growing commercial deployments. In this paper we present the first systematic stud...
Dan Pei, Jacobus E. van der Merwe
ICN
2007
Springer
14 years 1 months ago
Ring-Based Virtual Private Network Supporting a Large Number of VPNs
— In this paper, we propose a simple but effective VPN mechanism called RING-VPN (Ring-based Virtual Private Network) that realizes a high scalability in terms of the number of V...
Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhi...
NDSS
1999
IEEE
13 years 12 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
WIMOB
2007
IEEE
14 years 1 months ago
Securing Virtual Private Networks with SIM Authentication
—  With the ever increasing amount of systems requiring user authentication, users are experiencing an substantial inconvenience. A huge amount of passwords needs to be remember...
Torstein Bjørnstad, Ivar Jørstad, Do...