Sciweavers

1256 search results - page 187 / 252
» A Simple E-Voting Protocol
Sort
View
CCS
2007
ACM
15 years 7 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 7 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
99
Voted
HPCC
2007
Springer
15 years 7 months ago
Improving a Fault-Tolerant Routing Algorithm Using Detailed Traffic Analysis
Currently, some coarse measures like global network latency are used to compare routing protocols. These measures do not provide enough insight of traffic distribution among networ...
Abbas Nayebi, Arash Shamaei, Hamid Sarbazi-Azad
IPOM
2007
Springer
15 years 7 months ago
QoE Monitoring Platform for Video Delivery Networks
This paper presents a full video delivery network monitoring suite. Our monitoring tool offers a new view of a video delivery network, a view based on the quality perceived by fi...
Daniel De Vera, Pablo Rodríguez-Bocca, Gera...
ASWEC
2006
IEEE
15 years 6 months ago
Over-the-air Deployment of Applications in Multi-Platform Environments
Over-the-air (OTA) delivery of applications is important to support as it enables easy deployment and upgrades to applications, thereby reducing the disrupting effect which instal...
Tore Fjellheim