HOW TO EFFICIENTLY PROTECT A DOMAIN NAME?

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Search Efficiently

The only technique available for solving many important problems is searching. Since searching can be extremely costly, it is important to identify features that improve the efficiency of aearch algorithms. We compute the efficiency of simple backtracking, of an algorithm similar to backtracking except that it notices when the predicate is empty instead of noticing when it is unsatlsfiable (the...

متن کامل

How to Protect Against a Militant Spammer

We consider how to avoid unsolicited e-mail – so called spam – in a stronger adversarial model than has previously been considered. Our primary concern is the proposal of an architecture and of protocols preventing against successful spamming attacks launched by a strong attacker. This attacker is assumed to control the communication media and to be capable of corrupting large numbers of protoc...

متن کامل

How to protect biometric templates

In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabled widespread deployment of the biometric-based identification/verification systems. However, due to the nature of biometric data, well-established cryptographic tools (such as hashing, encryption, etc.) are not sufficient for solving one of the most important problems related to biometric system...

متن کامل

How to protect the protector?

This paper describes ongoing research to harden the lower part of the software stack, normally not covered by existing software-based fault-tolerance mechanisms. I discuss a combination of four techniques to harden the operating system kernel against hardware faults: resilient data structures, asynchronous checks, restartable OS services, and message protection. I present initial performance re...

متن کامل

How to Protect Fly Photoreceptors

December 2006 | Volume 4 | Issue 12 | e418 Most governments around the world set conservation policy based on the assumption that resource exploitation and species protection can co-exist in the same place. These policies have led to Orwellian “marine protected areas” that host commercial fi shing operations, leading one to wonder who’s protecting whom. A new study reveals the danger of this ap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Comparative Law Review

سال: 2017

ISSN: 0866-9449

DOI: 10.12775/clr.2016.010