Sciweavers

551 search results - page 40 / 111
» Preventing existence
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 5 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
ACSAC
2010
IEEE
14 years 8 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 6 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
JHSN
2000
172views more  JHSN 2000»
14 years 11 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...