Sciweavers

318 search results - page 40 / 64
» A New Perspective on Internet Security using Insurance
Sort
View
159
Voted
ESORICS
2006
Springer
15 years 8 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
IC
2004
15 years 6 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
BIOSURVEILLANCE
2007
Springer
15 years 11 months ago
Detecting Conserved RNA Secondary Structures in Viral Genomes: The RADAR Approach
Abstract. Conserved regions, or motifs, present among RNA secondary structures serve as a useful indicator for predicting the functionality of the RNA molecules. Automated detectio...
Mugdha Khaladkar, Jason T. L. Wang
ICISS
2005
Springer
15 years 10 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
TELSYS
2008
98views more  TELSYS 2008»
15 years 4 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo