Sciweavers

729 search results - page 105 / 146
» Towards Secure e-Services
Sort
View
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 6 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
VSTTE
2010
Springer
13 years 5 months ago
Towards Scalable Modular Checking of User-Defined Properties
Abstract. Theorem-prover based modular checkers have the potential to perform scalable and precise checking of user-defined properties by combining pathsensitive intraprocedural re...
Thomas Ball, Brian Hackett, Shuvendu K. Lahiri, Sh...
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
14 years 2 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
LOCWEB
2009
ACM
14 years 2 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
SEUS
2008
IEEE
14 years 2 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...