Sciweavers

8540 search results - page 323 / 1708
» The Dynamic Servers Problem
Sort
View
ACMSE
2006
ACM
15 years 10 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
156
Voted
NETGAMES
2006
ACM
15 years 10 months ago
A peer-to-peer architecture for massive multiplayer online games
Massive Multiplayer Online Games with their virtual gaming worlds grow in user numbers as well as in the size of the virtual worlds. With this growth comes a significant increase...
Thorsten Hampel, Thomas Bopp, Robert Hinn
EUROCRYPT
2004
Springer
15 years 9 months ago
Public Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An ema...
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky...
ANSS
2003
IEEE
15 years 9 months ago
Dissemination Scenarios in Peer-to-Peer Networks
As the average bandwidth capacity is increasing, users around the world demand for shorter service time. While the servers are able to acquire more bandwidth, they can not keep up...
Konstantinos G. Zerfiridis, Helen D. Karatza
DSN
2002
IEEE
15 years 9 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz