Sciweavers

2656 search results - page 502 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
SOUPS
2006
ACM
14 years 4 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
MONET
2011
13 years 1 months ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
SOSP
2001
ACM
14 years 7 months ago
The Costs and Limits of Availability for Replicated Services
As raw system and network performance continues to improve at exponential rates, the utility of many services is increasingly limited by availability rather than performance. A ke...
Haifeng Yu, Amin Vahdat
GLOBECOM
2006
IEEE
14 years 4 months ago
Assessing the Impact of Multiple Active Queue Management Routers
— Recent studies have shown that a non-negligible number of packets face multiple congested links on Internet paths. We investigate the impact of using multiple Active Queue Mana...
Michele C. Weigle, Deepak Vembar, Zhidian Du