2011 IEEE Ninth International Symposium on Parallel and Distributed Processing With Applications 2011
DOI: 10.1109/ispa.2011.33
|View full text |Cite
|
Sign up to set email alerts
|

Phoenix: A Fault-Tolerant Distributed Web Storage Based on URLs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
See 1 more Smart Citation
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
“…(4) Generate pad for id||P||C with the guessing l of P. (5) Generate C′ = C||pad||r, where r is randomly generated, and send it with the unchanged value id to the peer. (6) Receive R′ from the peer, reply an affirmative signal to it, generate pad1 for C′ and check if R′ = MD5 R (r) holds. If so, l is the very length.…”
Section: On-line Length Recovery Attack To Chapmentioning
confidence: 99%
“…This model allows Nenek's tools to get access to the resources that were acquired and manufactured by the virtual community. It maps each resource to an absolute uniform resource locator (URL), which is used to get access to that resource (Gonzalez and Marcelin-Jimenez 2011). When the life cycle tree of this resource has additional labels, this model builds an XML to keep the information associated to the labels of description and context.…”
Section: Sharing and Publication Mapping Modelmentioning
confidence: 99%
“…Data availability relates to the replication technique the Amazon infrastructure uses. 10 There also are solutions that take advantage of public cloud storage using replication techniques based on RAID, for example Redundant Array of Cloud Storage (RACS), a proxy located between multiple cloud storage providers and customers. 11 RACS distributes data in a way that provides an opportunity for clients to tolerate interruptions in a public cloud storage service or when the price for using such services gets too high.…”
Section: Related Workmentioning
confidence: 99%