Sciweavers

11 search results - page 3 / 3
» SyMon: Defending large structured P2P systems against Sybil ...
Sort
View
USS
2010
13 years 3 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp