Sciweavers

986 search results - page 110 / 198
» Protecting the Intranet Against
Sort
View
GLVLSI
2010
IEEE
154views VLSI» more  GLVLSI 2010»
13 years 10 months ago
Resource-constrained timing-driven link insertion for critical delay reduction
For timing-driven or yield-driven designs, non-tree routing has become more and more popular and additional loops provide the redundant paths to protect against the effect of the ...
Jin-Tai Yan, Zhi-Wei Chen
ATAL
2008
Springer
13 years 10 months ago
An Automata-Based Monitoring Technique for Commitment-Based Multi-Agent Systems
In open multi-agent systems (MASs) we cannot assume agents to be developed in a centralized fashion. Recent proposals of commitmentbased communication frameworks aim at increasing ...
Paola Spoletini, Mario Verdicchio
CCS
2008
ACM
13 years 10 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
ACSW
2007
13 years 9 months ago
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of ...
Audun Jøsang, Mohammed Al Zomai, Suriadi Su...