Sciweavers

2517 search results - page 87 / 504
» Secure Deployment of Components
Sort
View
127
Voted
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 9 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
SICHERHEIT
2010
15 years 1 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...
OOPSLA
2004
Springer
15 years 8 months ago
A framework for detecting, assessing and visualizing performance antipatterns in component based systems
Component-based enterprise systems often suffer from performance issues as a result of poor system design. In this paper, we propose a framework to automatically detect, assess an...
Trevor Parsons
128
Voted
TMA
2010
Springer
166views Management» more  TMA 2010»
15 years 10 months ago
Understanding and Preparing for DNS Evolution
The Domain Name System (DNS) is a crucial component of today’s Internet. The top layer of the DNS hierarchy (the root nameservers) is facing dramatic changes: cryptographically s...
Sebastian Castro, Min Zhang, Wolfgang John, Duane ...
130
Voted
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 3 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby