Sciweavers

1757 search results - page 248 / 352
» Secure Content Validation
Sort
View
SICHERHEIT
2010
15 years 1 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
ICITS
2009
15 years 29 days ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 10 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
MOC
2010
14 years 10 months ago
Sharply local pointwise a posteriori error estimates for parabolic problems
Abstract. We prove pointwise a posteriori error estimates for semi- and fullydiscrete finite element methods for approximating the solution u to a parabolic model problem. Our esti...
Alan Demlow, Charalambos Makridakis
CHI
2011
ACM
14 years 6 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi