Sciweavers

55 search results - page 1 / 11
» Notes On The Design Of An Internet Adversary
Sort
View
CORR
2004
Springer
80views Education» more  CORR 2004»
13 years 4 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
13 years 11 months ago
Note Taking and Note Sharing While Browsing Campaign Information
Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private ...
Scott P. Robertson, Ravi K. Vatrapu, George Abraha...
17
Voted
CCS
2007
ACM
13 years 11 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
13 years 9 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
JPDC
2007
117views more  JPDC 2007»
13 years 4 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...