Sciweavers

11 search results - page 2 / 3
» A novel proxy deposit protocol for e-cash systems
Sort
View
PET
2010
Springer
13 years 9 months ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
SIGOPSE
2000
ACM
13 years 9 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
DSN
2007
IEEE
13 years 11 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
CCS
2003
ACM
13 years 10 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
WWW
2006
ACM
14 years 6 months ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer