Sciweavers

1565 search results - page 249 / 313
» Optimizing Layered Communication Protocols
Sort
View
COMPSAC
2008
IEEE
14 years 4 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
GLOBECOM
2007
IEEE
14 years 4 months ago
Virtualization of Local Computer Bus Architectures Over the Internet
We propose a companion solution to iSCSI that is more suited for virtualization of local computer bus architectures, such as PCI/PCI-X and PCI Express. We explore the architecture ...
David A. Daniel, Joseph Y. Hui
ASIACRYPT
2005
Springer
14 years 3 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
SPAA
2010
ACM
14 years 2 months ago
Collaborative scoring with dishonest participants
Consider a set of players that are interested in collectively evaluating a set of objects. We develop a collaborative scoring protocol in which each player evaluates a subset of t...
Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti R...
IFIP
1998
Springer
14 years 2 months ago
Providing Reliable Agents for Electronic Commerce
It is widely agreed that mobile agents in conjunction with WWW technology will provide the technical foundation for future electronic commerce. A prerequisite for the use of mobile...
Markus Straßer, Kurt Rothermel, Christian Ma...