Sciweavers

32 search results - page 6 / 7
» On the efficiency of checking perfect privacy
Sort
View
USS
2004
13 years 7 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
IEEEARES
2010
IEEE
13 years 10 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
CCS
2010
ACM
13 years 6 months ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 5 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
BMCBI
2007
106views more  BMCBI 2007»
13 years 5 months ago
Simultaneous identification of long similar substrings in large sets of sequences
Background: Sequence comparison faces new challenges today, with many complete genomes and large libraries of transcripts known. Gene annotation pipelines match these sequences in...
Jürgen Kleffe, Friedrich Möller, Burghar...