132
click to vote
NDSS
15 years 7 months ago
2008 IEEE
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
121
click to vote
NDSS
15 years 7 months ago
2008 IEEE
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
119
click to vote
NDSS
15 years 7 months ago
2008 IEEE
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
123
click to vote
NDSS
15 years 7 months ago
2008 IEEE
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
|