Search
for Author
All Reviews
Gibbons, Phillip B.
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
3
of
3
reviews
SybilGuard: defending against sybil attacks via social networks
Yu H., Kaminsky M., Gibbons P., Flaxman A. IEEE/ACM Transactions on Networking 16(3): 576-589, 2008. Type: Article
A Sybil attack consists of a rogue host that can mine arbitrary identities and get into the system. While on the surface getting multiple identities may seem innocuous, the effects of a Sybil attack can be quite dangerou...
...
Nov 14 2008
On secure and pseudonymous client-relationships with multiple servers
Gabber E., Gibbons P., Kristol D., Matias Y., Mayer A. ACM Transactions on Information and System Security 2(4): 390-415, 1999. Type: Article
Janus is a cryptographic engine that may reside either in the computer that serves as an interface between a local network and the Internet, or in each computer attached to the local network. In the latter case, each Janus engine inter...
...
Mar 1 2000
Accounting for Memory Bank Contention and Delay in High-Bandwidth Multiprocessors
Blelloch G., Gibbons P., Matias Y., Zagha M. IEEE Transactions on Parallel and Distributed Systems 8(9): 943-958, 1997. Type: Article
An analytical model for predicting the performance of algorithms on a shared-memory multiprocessor is presented. The experiments use synthetic programs and four algorithms: for binary search, random permutation, sparse matrix multiplic...
...
Jun 1 1998
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy