Sciweavers

1770 search results - page 106 / 354
» Writing requirements in computer security
Sort
View
CARDIS
2006
Springer
109views Hardware» more  CARDIS 2006»
14 years 1 months ago
A Smart Card-Based Mental Poker System
On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote ...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
DSN
2006
IEEE
14 years 4 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
NGC
1998
Springer
171views Communications» more  NGC 1998»
13 years 9 months ago
Programming Languages for Distributed Applications
Much progress has been made in distributed computing in the areas of distribution structure, open computing, fault tolerance, and security. Yet, writing distributed applications r...
Seif Haridi, Peter Van Roy, Per Brand, Christian S...
PDP
2010
IEEE
14 years 5 months ago
A Light-weight API for Portable Multicore Programming
—Multicore nodes have become ubiquitous in just a few years. At the same time, writing portable parallel software for multicore nodes is extremely challenging. Widely available p...
Christopher G. Baker, Michael A. Heroux, H. Carter...
PODC
2004
ACM
14 years 3 months ago
Byzantine disk paxos: optimal resilience with byzantine shared memory
We present Byzantine Disk Paxos, an asynchronous shared-memory consensus algorithm that uses a collection of n > 3t disks, t of which may fail by becoming non-responsive or arb...
Ittai Abraham, Gregory Chockler, Idit Keidar, Dahl...