Sciweavers

2281 search results - page 350 / 457
» Security Patterns and Secure Systems Design
Sort
View
ICDCS
2009
IEEE
16 years 29 days ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
PPDP
2009
Springer
15 years 10 months ago
The RPC calculus
Several recent language designs have offered a unified language for programming a distributed system, with explicit notation of locations; we call these “location-aware” lan...
Ezra Cooper, Philip Wadler
OOPSLA
2004
Springer
15 years 9 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...
EUROCRYPT
1998
Springer
15 years 8 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
RTAS
1996
IEEE
15 years 8 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros