Sciweavers

480 search results - page 27 / 96
» Anonymous Transactions in Computer Networks
Sort
View
146
Voted
ESAS
2007
Springer
15 years 9 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
ICDCSW
2005
IEEE
15 years 9 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
114
Voted
NCA
2008
IEEE
15 years 10 months ago
Supporting Linearizable Semantics in Replicated Databases
This paper proposes a novel database replication algorithm that offers strong consistency (linearizable semantics) and allows reads and non-conflicting writes to execute in para...
Luís Rodrigues, Nuno Carvalho, Emili Miedes
100
Voted
DCOSS
2005
Springer
15 years 9 months ago
Stably Computable Properties of Network Graphs
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc communication network of arbitrary size and unknown topology, and explore what p...
Dana Angluin, James Aspnes, Melody Chan, Michael J...
129
Voted
MIDDLEWARE
2001
Springer
15 years 8 months ago
The CORBA Activity Service Framework for Supporting Extended Transactions
Although it has long been realised that ACID transactions by themselves are not adequate for structuring long-lived applications and much research work has been done on developing...
Iain Houston, Mark C. Little, Ian Robinson, Santos...