Sciweavers

551 search results - page 54 / 111
» Probing TCP Implementations
Sort
View
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
14 years 11 months ago
Anonymous Biometric Access Control based on homomorphic encryption
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An Anonymous Biometric Access Control (ABAC) system is proposed to...
Ying Luo, Sen-Ching S. Cheung, Shuiming Ye
ANCS
2005
ACM
15 years 7 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
ASIACRYPT
2003
Springer
15 years 6 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
ICNP
2007
IEEE
15 years 7 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
IPPS
2000
IEEE
15 years 5 months ago
Parallel Computation for Chromosome Reconstruction on a Cluster of Workstations
Reconstructing a physical map of a chromosome from a genomic library presents a central computational problem in genetics. Physical map reconstruction in the presence of errors is...
Suchendra M. Bhandarkar, Salem Machaka, Sanjay She...