Sciweavers

3452 search results - page 493 / 691
» Secure Data Outsourcing
Sort
View
SC
2005
ACM
15 years 10 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
SIGCOMM
2005
ACM
15 years 10 months ago
Policing congestion response in an internetwork using re-feedback
This paper introduces a novel feedback arrangement, termed re-feedback. It ensures metrics in data headers such as time to live and congestion notification will arrive at each re...
Bob Briscoe, Arnaud Jacquet, Carla Di Cairano-Gilf...
AVBPA
2005
Springer
266views Biometrics» more  AVBPA 2005»
15 years 10 months ago
A Hybrid Swipe Fingerprint Mosaicing Scheme
Due to their very small contact areas and low cost, swipe fingerprint sensors provide the very convenient and reliable fingerprint security solutions and are being increasingly u...
Yongliang Zhang, Jie Yang, Hongtao Wu
CCS
2005
ACM
15 years 10 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 10 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques