نتایج جستجو برای: untrusted relay

تعداد نتایج: 19885  

Journal: :J. Inf. Sci. Eng. 2016
Yu-Feng Ma Haibo Tian Baodian Wei

With the development of cloud computing, more and more mobile devices have the requirement to outsource expensive computations in an untrusted environment. Among all such computations, exponentiations modulo a large prime are basic and frequent operations in many discrete-logarithm-based cryptographic protocols. Currently the most efficient outsourcing algorithm of modular exponentiations is un...

2011
Mohan Dhawan Chung-chieh Shan Vinod Ganapathy

Transcript is a system that enhances JavaScript with support for speculative execution. It introduces a new transaction construct, which hosting Web applications can use to demarcate regions that contain untrusted guest code. Actions performed within a transaction are logged and considered speculative until they are examined by the host and committed. Uncommitted actions simply do not take and ...

2016
SOUMYADEEP GHOSH

Computers today are so complex and opaque that a user cannot know everything occurring within the system. Most efforts toward computer security have focused on securing software. However, software security techniques implicitly assume correct execution by the underlying system, including the hardware. Securing these systems has been challenging due to their complexity and the proportionate atta...

2008
Weiqing Sun R. Sekar Zhenkai Liang V. N. Venkatakrishnan

Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of access needed to install backdoors, spyware, rootkits, or “bot” software, and to hide these installations from users. Previous research has been focused mainly on securing the execution phase of untrusted software, w...

2017
V. Cerf S. Burleigh A. Hooke L. Torgerson R. Durst K. Scott E. Travis H. Weiss J. A. Rice R. K. Creber C. L. Fletcher P. A. Baxley K. E. Rogers D. C. Davison P. R. Pereira A. Casaca J. J. P. C. Rodrigues V. N. G. J. Soares J. Triay

Delay Tolerant Networks (DTNs) is a promising current research field that have captured a lot of attention. In DTN, an end-to-end path is not assured and packets are transmitted from a source node to a destination node by the use of store-carry-forward based routing. In case of DTN, a source node or an intermediary node accumulates the packets in its buffer and holds them at the time of moving ...

2003
Eu-Jin Goh Hovav Shacham Nagendra Modadugu Dan Boneh

This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. Key management and revocation is simple with minimal out-of-band communication. File system fres...

2004
Sheng Zhong

Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties

2014
Adam Waksman

Producing Trustworthy Hardware Using Untrusted Components, Personnel and Resources

2009
Scott Alexander Crosby Farinaz Koushanfar

Efficient Tamper-Evident Data Structures for Untrusted Servers

Low- impedance transformer ground differential relay is a part of power transformer protection system that is employed for detecting the internal earth faults. This is a fast and sensitive relay, but during some external faults and inrush current conditions, may be exposed to maloperation due to current transformer (CT) saturation. In this paper, a new intelligent transformer ground differentia...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید