Sciweavers

849 search results - page 31 / 170
» Completely Non-malleable Schemes
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 11 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
81
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
14 years 9 months ago
A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web Servers
E-commerce Web-servers often face overload conditions during which revenue-generating requests may be dropped or abandoned due to an increase in the browsing requests. In this pap...
Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Man...
CCR
2002
88views more  CCR 2002»
14 years 9 months ago
Retransmission schemes for streaming internet multimedia: evaluation model and performance analysis
This paper presents a trace-driven simulation study of two classes of retransmission timeout (RTO) estimators in the context of realtime streaming over the Internet. We explore th...
Dmitri Loguinov, Hayder Radha
VLDB
2010
ACM
190views Database» more  VLDB 2010»
14 years 8 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
ETT
2002
104views Education» more  ETT 2002»
14 years 9 months ago
Generalized window advertising for TCP congestion control
Congestion in the Internet is a major cause of network performance degradation. The Generalized Window Advertising (GWA) scheme proposed in this paper is a new approach for enhanci...
Mario Gerla, Renato Lo Cigno, Saverio Mascolo, Wen...