Sciweavers

90 search results - page 16 / 18
» Fault-Tolerant Aggregate Signatures
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
SGP
2004
13 years 7 months ago
Shape Segmentation Using Local Slippage Analysis
We propose a method for segmentation of 3D scanned shapes into simple geometric parts. Given an input point cloud, our method computes a set of components which possess one or mor...
Natasha Gelfand, Leonidas J. Guibas
ASIACRYPT
2008
Springer
13 years 6 months ago
Compact Proofs of Retrievability
In a proof-of-retrievability system, a data storage center must prove to a verifier that he is actually storing all of a client's data. The central challenge is to build syst...
Hovav Shacham, Brent Waters
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 6 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
OAS
2003
13 years 6 months ago
An ontology for Web service ratings and reputations
Current Web services standards enable publishing service descriptions and finding services by matching requested and published descriptions based on syntactic criteria such as me...
E. Michael Maximilien, Munindar P. Singh