Sciweavers

480 search results - page 73 / 96
» Anonymous Transactions in Computer Networks
Sort
View
97
Voted
CCS
2008
ACM
15 years 2 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
MOBISYS
2008
ACM
16 years 12 hour ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
ICDCSW
2006
IEEE
15 years 6 months ago
Benchmarking a Semantic Web Service Architecture for Fault-tolerant B2B Integration
With the development and maturity of ServiceOriented Architectures (SOA) to support business-tobusiness transactions, organizations are implementing Web services to expose their p...
Jorge Cardoso
ICDCSW
2003
IEEE
15 years 5 months ago
An Adaptive Object Allocation and Replication Algorithm in Distributed Databases
In a Distributed Database System (DDBS), transactions on objects can be read requests or write requests in a random manner. The replication algorithm of objects critically affects...
Wujuan Lin, Bharadwaj Veeravalli
88
Voted
PODC
1996
ACM
15 years 4 months ago
Atomicity in Electronic Commerce
There is tremendous demand for the ability to be able to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large var...
J. D. Tygar