Sciweavers

881 search results - page 72 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
USENIX
2004
15 years 3 months ago
Reliability and Security in the CoDeeN Content Distribution Network
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running distributed services that interact with other resources on the Web. The CoDeeN C...
Limin Wang, KyoungSoo Park, Ruoming Pang, Vivek S....
WPES
2003
ACM
15 years 7 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
ICALP
2000
Springer
15 years 5 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 8 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
ICPR
2010
IEEE
15 years 7 months ago
RBM-Based Silhouette Encoding for Human Action Modelling
—In this paper we evaluate the use of Restricted Bolzmann Machines (RBM) in the context of learning and recognizing human actions. The features used as basis are binary silhouett...
Manuel Jesus Marin-Jimenez, Nicolas Perez De La Bl...