Sciweavers

6555 search results - page 150 / 1311
» Secure attribute-based systems
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 2 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
DISCEX
2003
IEEE
15 years 7 months ago
TetherNet Anti-NAT - Secure Internet Subnet Rental System
1 TetherNet is a system for dynamically relocating Internet subnets. It provides real Internet service consisting of real IP addresses, and forward and reverse DNS, even behind NAT...
Joseph D. Touch, Lars Eggert, Yu-Shun Wang
FC
2010
Springer
158views Cryptology» more  FC 2010»
15 years 2 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
JIPS
2010
110views more  JIPS 2010»
14 years 9 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
RAID
2007
Springer
15 years 8 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...