Sciweavers

1186 search results - page 121 / 238
» A New Approach to Secure Logging
Sort
View
RSA
2000
170views more  RSA 2000»
15 years 14 days ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
91
Voted
OOPSLA
2007
Springer
15 years 6 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 7 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
93
Voted
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 6 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
111
Voted
AINA
2009
IEEE
15 years 7 months ago
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks
— Sensor networks are commonly used for security and surveillance applications. As sensor nodes have limited battery paower, computing, and storage resources, the energy efficie...
Andrei Gagarin, Sajid Hussain, Laurence Tianruo Ya...