Sciweavers

897 search results - page 120 / 180
» Security Requirements for RFID Computing Systems
Sort
View
ICNP
2009
IEEE
13 years 5 months ago
DirCast: A Practical and Efficient Wi-Fi Multicast System
Abstract--IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast s...
Ranveer Chandra, Sandeep Karanth, Thomas Moscibrod...
USS
2010
13 years 6 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
GLOBECOM
2009
IEEE
14 years 1 hour ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
USENIX
2003
13 years 9 months ago
A Multi-User Virtual Machine
Recent efforts aimed at improving the scalability of the JavaTM platform have focused primarily on the safe collocation of multiple applications in the virtual machine. This is of...
Grzegorz Czajkowski, Laurent Daynès, Ben Ti...