Sciweavers

4511 search results - page 651 / 903
» Observation Based System Security
Sort
View
152
Voted
EUROCRYPT
2010
Springer
15 years 8 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
FAST
2007
15 years 5 months ago
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Component failure in large-scale IT installations is becoming an ever larger problem as the number of components in a single cluster approaches a million. In this paper, we presen...
Bianca Schroeder, Garth A. Gibson
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
16 years 5 months ago
Tree-Pattern Similarity Estimation for Scalable Content-based Routing
With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important...
Raphaël Chand, Pascal Felber, Minos N. Garofa...
IWDC
2001
Springer
145views Communications» more  IWDC 2001»
15 years 8 months ago
Activating and Deactivating Repair Servers in Active Multicast Trees
Abstract. For time-constrained applications, repair-server-based active local recovery approaches can be valuable in providing low-latency reliable multicast service. However, an a...
Ping Ji, James F. Kurose, Donald F. Towsley