Sciweavers

274 search results - page 43 / 55
» The Design, Implementation and Operation of an Email Pseudon...
Sort
View
WWW
2008
ACM
16 years 11 days ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
HPCA
2003
IEEE
16 years 1 days ago
Dynamic Data Replication: An Approach to Providing Fault-Tolerant Shared Memory Clusters
A challenging issue in today's server systems is to transparently deal with failures and application-imposed requirements for continuous operation. In this paper we address t...
Rosalia Christodoulopoulou, Reza Azimi, Angelos Bi...
ICSE
2003
IEEE-ACM
15 years 11 months ago
Pattern-Oriented Distributed System Architectures
ion. riented language features, such as abstract classes, inheritance, dynamic binding, and parameterized types. Middleware, such as object-oriented frameworks for host infrastruct...
Douglas C. Schmidt
ESORICS
2007
Springer
15 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
NOSSDAV
2004
Springer
15 years 5 months ago
Scalable resilient media streaming
We present a low-overhead media streaming system, called SRMS (Scalable Resilient Media Streaming) that can be used to scalably deliver streaming data to a large group of receiver...
Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby B...