Sciweavers

21 search results - page 4 / 5
» Risk Balance in Exchange Protocols
Sort
View
SRDS
2007
IEEE
14 years 18 days ago
Customizable Fault Tolerance for Wide-Area Replication
Constructing logical machines out of collections of physical machines is a well-known technique for improving the robustness and fault tolerance of distributed systems. We present...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
SECON
2008
IEEE
14 years 22 days ago
Fast Exclusion of Errant Devices from Vehicular Networks
—Vehicular networks, in which cars communicate wirelessly to exchange information on traffic conditions, offer a promising way to improve road safety. Yet ensuring the correct f...
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis...
IFIP
2010
Springer
13 years 1 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
ESORICS
2009
Springer
14 years 7 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
NETWORK
2008
106views more  NETWORK 2008»
13 years 6 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford