Sciweavers

16 search results - page 1 / 4
» Authors' Reply
Sort
View
AUTOMATICA
2008
66views more  AUTOMATICA 2008»
13 years 4 months ago
Author's reply
Er-Wei Bai
AUTOMATICA
2002
62views more  AUTOMATICA 2002»
13 years 4 months ago
Authors' Reply
Chyi Hwang, Shih-Feng Yang
ISCC
2005
IEEE
13 years 10 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
NDSS
2008
IEEE
13 years 11 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...