Sciweavers

3451 search results - page 10 / 691
» Security of Backup Data
Sort
View
159
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
106
Voted
EUROPKI
2004
Springer
15 years 9 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
145
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
182
Voted
ICNP
2002
IEEE
15 years 8 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong
101
Voted
ICCD
2005
IEEE
92views Hardware» more  ICCD 2005»
16 years 19 days ago
Mitigating Soft Errors in Highly Associative Cache with CAM-based Tag
Content Addressable Memories (CAM) are widely used for the tag portions in highly associative caches. Since data are not explicitly read out of tag array in CAM search, the detect...
Luong Dinh Hung, Masahiro Goshima, Shuichi Sakai