Sciweavers

241 search results - page 24 / 49
» Private Capacities in Mechanism Design
Sort
View
CCS
2011
ACM
12 years 9 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
ESA
2007
Springer
125views Algorithms» more  ESA 2007»
14 years 4 months ago
Pricing Tree Access Networks with Connected Backbones
Consider the following network subscription pricing problem. We are given a graph G = (V, E) with a root r, and potential customers are companies headquartered at r with locations...
Vineet Goyal, Anupam Gupta, Stefano Leonardi, R. R...
INFOCOM
2009
IEEE
14 years 4 months ago
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various o...
Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wa...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 2 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ICAC
2009
IEEE
14 years 4 months ago
Injecting realistic burstiness to a traditional client-server benchmark
The design of autonomic systems often relies on representative benchmarks for evaluating system performance and scalability. Despite the fact that experimental observations have e...
Ningfang Mi, Giuliano Casale, Ludmila Cherkasova, ...