Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program st...
In this study, we investigate a cost-effective approach for protecting several multicast sessions from any link failure in an optical network. The approach, referred to as cross-s...
Narendra K. Singhal, Canhui Ou, Biswanath Mukherje...
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential p...
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....