Sciweavers

1102 search results - page 162 / 221
» Distributed Key Generation for the Internet
Sort
View
SEC
2003
15 years 4 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
ACSAC
2010
IEEE
15 years 29 days ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
HPCA
2003
IEEE
16 years 3 months ago
Tradeoffs in Buffering Memory State for Thread-Level Speculation in Multiprocessors
Thread-level speculation provides architectural support to aggressively run hard-to-analyze code in parallel. As speculative tasks run concurrently, they generate unsafe or specul...
María Jesús Garzarán, Milos P...
SRDS
2008
IEEE
15 years 9 months ago
Towards Reliable Reputations for Dynamic Networked Systems
A new generation of distributed systems and applications rely on the cooperation of diverse user populations motivated by self-interest. While they can utilize “reputation syste...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
ICSOC
2007
Springer
15 years 9 months ago
Towards Self-management in Service-Oriented Computing with Modes
Abstract. A self-managed system is both self-assembling and selfhealing. Service-oriented Computing (SoC) architectures, such as a Web Services Architecture (WS-A) illustrate a hig...
Howard Foster, Sebastián Uchitel, Jeff Kram...