Sciweavers

8 search results - page 1 / 2
» Making Secure TCP Connections Resistant to Server Failures
Sort
View
77
Voted
ACSAC
2003
IEEE
15 years 3 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
ISPA
2005
Springer
15 years 3 months ago
ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections
Abstract. This paper proposes a novel scheme, named ER-TCP, which transparently masks the failures happened on the server nodes in a cluster from clients at TCP connection granular...
Zhiyuan Shao, Hai Jin, Bin Cheng, Wenbin Jiang
83
Voted
JSAC
2007
83views more  JSAC 2007»
14 years 10 months ago
Constructing an optimal server set in structured peer-to-peer networks
— To achieve high performance and resilience to failures, a client can make connections with multiple servers simultaneously and receive different portions of the data from each ...
Seung Chul Han, Ye Xia
WWW
2007
ACM
15 years 11 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
99
Voted
CCS
2006
ACM
15 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch