Sciweavers

1565 search results - page 249 / 313
» Optimizing Layered Communication Protocols
Sort
View
118
Voted
COMPSAC
2008
IEEE
15 years 9 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
124
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Virtualization of Local Computer Bus Architectures Over the Internet
We propose a companion solution to iSCSI that is more suited for virtualization of local computer bus architectures, such as PCI/PCI-X and PCI Express. We explore the architecture ...
David A. Daniel, Joseph Y. Hui
142
Voted
ASIACRYPT
2005
Springer
15 years 8 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
SPAA
2010
ACM
15 years 7 months ago
Collaborative scoring with dishonest participants
Consider a set of players that are interested in collectively evaluating a set of objects. We develop a collaborative scoring protocol in which each player evaluates a subset of t...
Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti R...
IFIP
1998
Springer
15 years 6 months ago
Providing Reliable Agents for Electronic Commerce
It is widely agreed that mobile agents in conjunction with WWW technology will provide the technical foundation for future electronic commerce. A prerequisite for the use of mobile...
Markus Straßer, Kurt Rothermel, Christian Ma...