Sciweavers

360 search results - page 56 / 72
» On Protection by Layout Randomization
Sort
View
IPPS
1999
IEEE
15 years 1 months ago
An Adaptive, Fault-Tolerant Implementation of BSP for JAVA-Based Volunteer Computing Systems
Abstract. In recent years, there has been a surge of interest in Javabased volunteer computing systems, which aim to make it possible to build very large parallel computing network...
Luis F. G. Sarmenta
CONEXT
2007
ACM
15 years 1 months ago
On improving the efficiency and manageability of NotVia
This paper presents techniques that improve the efficiency and manageability of an IP Fast Reroute (IPFRR) technology: NotVia. NotVia provides the IPFRR service for all destinatio...
Ang Li, Pierre Francois, Xiaowei Yang
ICB
2007
Springer
164views Biometrics» more  ICB 2007»
15 years 1 months ago
Hardening Fingerprint Fuzzy Vault Using Password
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure te...
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
15 years 26 days ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
80
Voted
NSDI
2007
14 years 11 months ago
Ensuring Content Integrity for Untrusted Peer-to-Peer Content Distribution Networks
Many existing peer-to-peer content distribution networks (CDNs) such as Na Kika, CoralCDN, and CoDeeN are deployed on PlanetLab, a relatively trusted environment. But scaling them...
Nikolaos Michalakis, Robert Soulé, Robert G...