Sciweavers

5123 search results - page 108 / 1025
» Performance and Security Tradeoff
Sort
View
TPDS
2008
116views more  TPDS 2008»
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
POLICY
2007
Springer
15 years 10 months ago
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel,...
OOPSLA
1993
Springer
15 years 8 months ago
Object Fault Handling for Persistent Programming Languages: A Performance Evaluation
A key mechanism of a persistent programming language is its ability to detect and handle references to non-resident objects. Ideally, this mechanism should be hidden from the prog...
Antony L. Hosking, J. Eliot B. Moss
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 11 months ago
IPSec: Performance Analysis and Enhancements
Abstract— Internet Protocol Security (IPSec) is a widely deployed mechanism for implementing Virtual Private Networks (VPNs). In previous work, we examined the overheads incurred...
Craig A. Shue, Minaxi Gupta, Steven A. Myers
ACSAC
2006
IEEE
15 years 10 months ago
Extended Protection against Stack Smashing Attacks without Performance Loss
In this paper we present an efficient countermeasure against stack smashing attacks. Our countermeasure does not rely on secret values (such as canaries) and protects against att...
Yves Younan, Davide Pozza, Frank Piessens, Wouter ...