Probabilistic counting algorithms for data base applications
Journal of Computer and System Sciences
Counting large numbers of events in small registers
Communications of the ACM
ICALP '92 Proceedings of the 19th International Colloquium on Automata, Languages and Programming
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Probabilistic validation of aggregated data in vehicular ad-hoc networks
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
International Journal of Information and Computer Security
A hybrid method to detect deflation fraud in cost-per-action online advertising
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Efficient and secure threshold-based event validation for VANETs
Proceedings of the fourth ACM conference on Wireless network security
Hi-index | 0.00 |
Designing a suitable confinement mechanism to confine untrusted applications is challenging as such a mechanism needs to satisfy conflicting requirements. The main trade-off is between ease of use and flexibility. In this paper, we present the design, ...