Sciweavers

92 search results - page 19 / 19
» Secure Two-party Protocols for Point Inclusion Problem
Sort
View
124
Voted
EUROSYS
2006
ACM
16 years 19 days ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
145
Voted
USS
2004
15 years 4 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson