Sciweavers

1843 search results - page 193 / 369
» Securing Class Initialization
Sort
View
136
Voted
OOPSLA
2010
Springer
15 years 28 days ago
Task types for pervasive atomicity
Atomic regions are an important concept in correct concurrent programming: since atomic regions can be viewed as having executed in a single step, atomicity greatly reduces the nu...
Aditya Kulkarni, Yu David Liu, Scott F. Smith
110
Voted
PVLDB
2010
179views more  PVLDB 2010»
15 years 28 days ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...
141
Voted
SDMW
2010
Springer
15 years 27 days ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
ACSAC
2010
IEEE
15 years 17 days ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
TELSYS
2010
154views more  TELSYS 2010»
14 years 9 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert