نتایج جستجو برای: untrusted relay

تعداد نتایج: 19885  

2012
Shumon Alam A. Annamalai

Relay based cooperative spectrum sensing elevates the spectrum sensing problems in harsh propagation conditions if the relay nodes are positioned suitably for the dynamic spectrum access systems. This article investigates the performance of relay based spectrum sensing (energy detection based) in myriad fading environments using the area under the receiver operating characteristic curve (AUC) p...

1999
David A. Wagner Eric Brewer

Security is a serious concern on today's computer networks. Many applications are not very good at resisting attack, and our operating systems are not very good at preventing the spread of any intrusions that may result. In this thesis, we propose to manage the risk of a security breach by con ning these untrusted (and untrustworthy) applications in a carefully sanitized space. We design a secu...

2002
David Mazières Dennis Shasha

This paper shows how to implement a trusted network file system on an untrusted server. While cryptographic storage techniques exist that allow users to keep data secret from untrusted servers, this work concentrates on the detection of tampering attacks and stale data. Ideally, users of an untrusted storage server would immediately and unconditionally notice any misbehavior on the part of the ...

2003
George C. Necula Robert R. Schneck

We propose a framework called configurable proofcarrying code, which allows the untrusted producer of mobile code to provide the bulk of the code verifier used by a code receiver to check the safety of the received code. The resulting system is both more flexible and also more trustworthy than a standard proof-carrying code system, because only a small part of the verifier needs to be trusted, ...

2016
Céline Chevalier Fabien Laguillaumie Damien Vergnaud

We address the problem of speeding up group computations in cryptography using a single untrusted computational resource. We analyze the security of an efficient protocol for securely outsourcing multiexponentiations proposed at ESORICS 2014. We show that this scheme does not achieve the claimed security guarantees and we present several practical polynomial-time attacks on the delegation proto...

1996
Ian Goldberg David Wagner Randi Thomas Eric A. Brewer

Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises signi cant security concerns. Therefore, it is desirable to create a secure environment to contain ...

1996
Ian Goldberg David A. Wagner Randi Thomas Eric A. Brewer

Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises signi cant security concerns. Therefore, it is desirable to create a secure environment to contain ...

کاظمی, هادی, جعفریان, مریم , دیوان بیگی, اشکان , کریم زاده, فریبا , گرجی, علی ,

Abstract Background: Epilepsy is one of the most common neurological disorders. Seizures could be presented as general or focal attacks. Absence epilepsy is one of the main forms of the general epilepsy and associated with sudden impairment of consciousness and non/convulsive generalized attacks. The prevalence of absence epilepsy was estimated about 10% of all types of seizures and seizures o...

1998
Dickon Reed Ian Pratt Stephen Early Paul Menage Neil Stratford

Many networked applications could beneet from executing components of their functionality closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring large quantities of data over congested or expensive network links. However, no public infrastructure currently exists to enable users to do this; they ar...

2012
David J. Malan

We introduce CS50 Sandbox, an environment for secure execution of untrusted code. Implemented as an asynchronous HTTP server, CS50 Sandbox offers clients the ability to execute programs (both interactive and non-interactive) written in any compiled or interpreted language in a tightly controlled, resource-constrained environment. CS50 Sandbox’s HTTP-based API takes files, command lines, and sta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید