Sciweavers

477 search results - page 72 / 96
» The Case For Personal Computers As Workstations
Sort
View
CCS
2008
ACM
13 years 9 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CONEXT
2008
ACM
13 years 9 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...
WISEC
2010
ACM
14 years 11 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
DRM
2005
Springer
14 years 1 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
SPAA
2004
ACM
14 years 29 days ago
Cache-oblivious shortest paths in graphs using buffer heap
We present the Buffer Heap (BH), a cache-oblivious priority queue that supports Delete-Min, Delete, and Decrease-Key operations in O( 1 B log2 N B ) amortized block transfers fro...
Rezaul Alam Chowdhury, Vijaya Ramachandran