Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Gibbons, Phillip B. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  SybilGuard: defending against sybil attacks via social networks
Yu H., Kaminsky M., Gibbons P., Flaxman A. IEEE/ACM Transactions on Networking 16(3): 576-589, 2008.  Type: Article

A Sybil attack consists of a rogue host that can mine arbitrary identities and get into the system. While on the surface getting multiple identities may seem innocuous, the effects of a Sybil attack can be quite dangerou...
...
Nov 14 2008  
  On secure and pseudonymous client-relationships with multiple servers
Gabber E., Gibbons P., Kristol D., Matias Y., Mayer A. ACM Transactions on Information and System Security 2(4): 390-415, 1999.  Type: Article

Janus is a cryptographic engine that may reside either in the computer that serves as an interface between a local network and the Internet, or in each computer attached to the local network. In the latter case, each Janus engine inter...
...
Mar 1 2000  
  Accounting for Memory Bank Contention and Delay in High-Bandwidth Multiprocessors
Blelloch G., Gibbons P., Matias Y., Zagha M. IEEE Transactions on Parallel and Distributed Systems 8(9): 943-958, 1997.  Type: Article

An analytical model for predicting the performance of algorithms on a shared-memory multiprocessor is presented. The experiments use synthetic programs and four algorithms: for binary search, random permutation, sparse matrix multiplic...
...
Jun 1 1998  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy