Sciweavers

854 search results - page 106 / 171
» Abstracting from Failure Probabilities
Sort
View
149
Voted
ASIACRYPT
2009
Springer
15 years 8 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 6 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
171
Voted
OSDI
2000
ACM
15 years 6 months ago
Overcast: Reliable Multicasting with an Overlay Network
Overcast is an application-level multicasting system that can be incrementally deployed using today's Internet infrastructure. These properties stem from Overcast's impl...
John Jannotti, David K. Gifford, Kirk L. Johnson, ...
136
Voted
JCO
2006
150views more  JCO 2006»
15 years 4 months ago
Efficient algorithms for shared backup allocation in networks with partial information
Abstract. We study efficient algorithms for establishing reliable connections with bandwidth guarantees in communication networks. In the normal mode of operation, each connection ...
Yigal Bejerano, Joseph Naor, Alexander Sprintson
TON
1998
93views more  TON 1998»
15 years 4 months ago
An evaluation of flow control in group communication
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Shivakant Mishra, Lei Wu