Securing the .NET programming model

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing the Net - The Fruits of Incompetence

Corporations wor:dwide eniy regard the Imerriet, once the ainiost exclusive p1av.ound uf the global community of aputer nerds, as an immense business opportunity. TJntilrece.ntly phrases such as “consult our homepage at bttp: / /w. dficr±ne cent” made seicie to orjv a few now they belong to our everyday vocabulary. This is all part of the explosive owtb of what ha been called the Global Ira.fcn...

متن کامل

MapReduce Programming Model for .NET-based Distributed Computing

Recently many data center scale of computer systems are built in order to meet the high storage and processing demands of data-intensive and computeintensive applications. MapReduce is one of the most popular programming models designed to support the development of such applications. It is initially proposed by Google for simplifying the development of large scale web search applications in da...

متن کامل

MapReduce Programming Model for .NET-Based Cloud Computing

Recently many large scale computer systems are built in order to meet the high storage and processing demands of compute and data-intensive applications. MapReduce is one of the most popular programming models designed to support the development of such applications. It was initially created by Google for simplifying the development of large scale web search applications in data centers and has...

متن کامل

Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability

We show that the simple and appealing unconditionally sound mix-net due to Abe (Asiacrypt’99) can be augmented to further guarantee anonymity against malicious verifiers. This additional guarantee implies, in particular, that when applying the Fiat-Shamir transform to the mix-net’s underlying sub-protocols, anonymity is provably guaranteed for any hash function. As our main contribution, we dem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2006

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2006.08.014