Raluca

Results: 135



#Item
61Online chat / Network protocols / File sharing networks / Cross-platform software / Computing

Privacy and Accountability for Location-based Aggregate Statistics Raluca Ada Popa MIT

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:00
62RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-09-14 01:51:10
63Wireless / Wireless mesh network / Mesh networking / IEEE 802.11s / Mobile IP / Computer network / Multicast / IP multicast / Wireless ad-hoc network / Wireless networking / Technology / Network architecture

The SMesh Wireless Mesh Network Yair Amir1 , Claudiu Danilov2 , Raluca Mus˘aloiu-Elefteri1 , Nilo Rivera1 1 Johns Hopkins University 2 Boeing Phantom Works

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:35
64

„…MIT EINER SPITZE LATINITÄT”? Thomas Manns „problematische“ Beziehung zu Frankreich im Hinblick auf seine Antimodernität Raluca Herghelegiu I. Thomas Mann gilt als eine der Referenzgestalten der deutschen L

Add to Reading List

Source URL: www.unibuc.ro

Language: German - Date: 2012-01-19 03:31:29
    65Financial statements / Generally Accepted Accounting Principles / Financial accounting / Financial accountancy / International Financial Reporting Standards / Accountant / Inventory / Valuation / Income statement / Business / Accountancy / Finance

    Social Economic Debates 2014, Vol. 3, No. 2 ISSN; ISSN-LThe importance of accounting principles in the accounting profession Daniela Raluca PĂTRAŞCU

    Add to Reading List

    Source URL: www.economic-debates.ro

    Language: English - Date: 2014-10-03 06:53:37
    66Secon / Voice over IP / Support / Electronic engineering / Electronics / Wireless networking / Technology / Companies based in Bangalore

    A  Robust  Push-­‐to-­‐Talk  Service  for   Wireless  Mesh  Networks Yair Amir, Raluca Musaloiu-Elefteri, Nilo Rivera Distributed Systems and Networks Lab Johns Hopkins University

    Add to Reading List

    Source URL: www.smesh.org

    Language: English - Date: 2011-06-14 12:17:04
    67Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

    BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-23 09:24:18
    68Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

    Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2014-08-11 20:10:44
    69Secure communication / HTTP / Internet privacy / Public-key cryptography / HTTP Secure / Cryptocat / Encrypting File System / IBM Lotus Notes / Cryptography / Cryptographic software / Cryptographic protocols

    Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

    Add to Reading List

    Source URL: pdos.csail.mit.edu

    Language: English - Date: 2015-03-27 16:16:57
    70Database management systems / Relational database management systems / Data modeling / SQL keywords / Cross-platform software / Database / SQL / Column / Proxy server / Data management / Computing / Data

    CryptDB: Protecting Confidentiality with Encrypted Query Processing Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL A BSTRACT

    Add to Reading List

    Source URL: www.mit.edu

    Language: English - Date: 2014-09-26 19:20:39
    UPDATE