Sciweavers

480 search results - page 16 / 96
» Anonymous Transactions in Computer Networks
Sort
View
NDSS
2009
IEEE
15 years 7 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
112
Voted
CCS
2009
ACM
15 years 7 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
96
Voted
ECUMN
2007
Springer
15 years 4 months ago
Improved User Identity Confidentiality for UMTS Mobile Networks
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such s...
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
189
Voted

Publication
187views
16 years 10 months ago
A Comparison of Hashing Schemes for Address Lookup in Computer Networks - More Detailed
This is a more detailed version of the paper with the same title published in the IEEE Transactions on Communications, October 1992
R. Jain
115
Voted
DSN
2008
IEEE
15 years 6 months ago
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL
Multi-Instance-Precommit (MIP) has been recently presented as an innovative transaction management scheme in support of reliability for Atomic Transactions in multitier (e.g. Web-...
Paolo Romano, Francesco Quaglia