Learn More
In this paper we present SINE, a cache-friendly protocol for integrity-enforced web documents. SINE operates by decoupling integrity from confidentiality and provides web documents with an integrity-enforcement authentication tag that can be incrementally verified by multiple parties. We developed a prototype implementation of SINE with minimal changes to(More)
— The capacity of an optical CDMA (OCDMA) network has traditionally been defined as the number of continuously transmitting circuits supported by the network. In this paper, we use teletraffic models to determine the teletraffic capacity of a circuit-switched OCDMA network where circuits carry bursty traffic. Our analysis is independent of the OCDMA(More)
We show how an eavesdropper with a small amount of knowledge about the traffic sent via a spectral-phase optical CDMA system with phase-scrambling can break the confidentially of certain systems within a few bit intervals. Optical CDMA (OCDMA) [1] is a particularly attractive alternative to traditional digital encryption because it has the potential to(More)
—In this paper we identify and define Zenith attacks, a new class of attacks on content-distribution systems, which seek to expose the popularity (i.e. access frequency) of individual items of content. As the access pattern to most real-world content exhibits Zipf-like characteristics [2], there is a small set of dominating items which account for the(More)
MOTIVATION The approaches usually used for building large genetic maps consist of dividing the marker set into linkage groups and provide local orders that can be tested by multi-point linkage analysis. To deal with the limitations of these approaches, a strategy taking the marker set into account globally is defined. RESULTS The paper presents a new(More)
Introduction Interdomain routing, the primary method of communication on the internet, is known to be vulnerable to class of attack called prefix hijack. Several studies [10] [9] have made claims that state BGP prefix hijack attacks are more effective on tier 1 (T1) origins than tier 2 (T2) or stub origins. However, to our knowledge all of the claims have(More)
In order to predict the effects of a fusion energy project's magnet current requirements on the harmonics and power factor at the power system's supply line source, a detailed three-phase converter model, including the overlap angle, is presented. This converter model is contained within the transient analysis control systems (TACS) portion of the(More)
  • 1