Sciweavers

290 search results - page 12 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
110
Voted
APNOMS
2006
Springer
15 years 3 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
77
Voted
CCS
2007
ACM
15 years 5 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
DSN
2009
IEEE
15 years 6 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Decentralized Key Management Scheme in Overlay Multicast Network
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time st...
Xingfeng Guo, Xiaodong Liu, Qionghai Dai
NETWORKING
2004
15 years 1 months ago
Scalable Packet Classification through Maximum Entropy Hashing
In this paper we propose a new packet classification algorithm, which can substantially improve the performance of a classifier by decreasing the rulebase lookup latency. The algor...
Lynn Choi, Jaesung Heo, Hyogon Kim, Jinoo Joung, S...