Sciweavers

1085 search results - page 162 / 217
» A Timing Attack on RC5
Sort
View
BNCOD
2004
65views Database» more  BNCOD 2004»
14 years 11 months ago
Reducing Damage Assessment Latency in Survivable Databases
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
ICWN
2004
14 years 11 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
SIGKDD
2008
124views more  SIGKDD 2008»
14 years 9 months ago
WebKDD 2008: 10 years of knowledge discovery on the web post-workshop report
WebKDD was held in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2008), August 24, 2008, in Henderson/Las Vegas, Nevada...
Olfa Nasraoui, Myra Spiliopoulou, Osmar R. Zaï...
CN
2000
64views more  CN 2000»
14 years 9 months ago
Risks of the Passport single signon protocol
Passport is a protocol that enables users to sign onto many different merchants' web pages by authenticating themselves only once to a common server. This is important becaus...
David P. Kormann, Aviel D. Rubin
TPDS
2010
87views more  TPDS 2010»
14 years 8 months ago
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Abstract—In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This crea...
Minghong Lin, John C. S. Lui, Dah-Ming Chiu