Sciweavers

308 search results - page 45 / 62
» On implementing security at the transport layer
Sort
View
BIRTHDAY
2012
Springer
13 years 5 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...
EDBT
2008
ACM
147views Database» more  EDBT 2008»
15 years 9 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
112
Voted
CLUSTER
2005
IEEE
15 years 3 months ago
Transparent Checkpoint-Restart of Distributed Applications on Commodity Clusters
We have created ZapC, a novel system for transparent coordinated checkpoint-restart of distributed network applications on commodity clusters. ZapC provides a thin virtualization ...
Oren Laadan, Dan B. Phung, Jason Nieh
ICOIN
2001
Springer
15 years 1 months ago
Web-Based Distributed Topology Discovery of IP Networks
For the purpose of distributed network management, this paper employs a Web-based distributed network management architecture which uses the same HTTP protocol to download Java ap...
Hwa-Chun Lin, Yi-Fan Wang, Chien-Hsing Wang, Chien...
GLOBECOM
2010
IEEE
14 years 6 months ago
Performance Evaluation of TCP over Optical Burst Switched (OBS) Networks Using Coordinated Burst Cloning and Forward-Segment Red
Random contentions occur in optical burst-switched (OBS) networks because of one-way signaling and lack of optical buffers. These contentions can occur at low loads and are not nec...
Julie Sullivan, Neal Charbonneau, Vinod Vokkarane