Sciweavers

8655 search results - page 424 / 1731
» Challenges for Trusted Computing
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
CIG
2005
IEEE
15 years 9 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
STORAGESS
2005
ACM
15 years 9 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
AP2PC
2005
Springer
15 years 9 months ago
Incentive-Compatibility in a Distributed Autonomous Currency System
Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet. i-WAT[10] is a prop...
Kenji Saito, Eiichi Morino, Jun Murai
126
Voted
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 9 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork