Sciweavers

499 search results - page 55 / 100
» A Study on Latent Vulnerabilities
Sort
View
91
Voted
CCR
2010
100views more  CCR 2010»
15 years 19 days ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
95
Voted
ADT
2006
15 years 17 days ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
91
Voted
IJWMC
2006
112views more  IJWMC 2006»
15 years 15 days ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
MR
2006
118views Robotics» more  MR 2006»
15 years 14 days ago
Single event burnout in power diodes: Mechanisms and models
Power electronic devices are susceptible to catastrophic failures when they are exposed to energetic particles; the most serious failure mechanism is single event burnout (SEB). S...
A. M. Albadri, Ronald D. Schrimpf, Kenneth F. Gall...
NGC
2002
Springer
104views Communications» more  NGC 2002»
15 years 5 days ago
Multicast Congestion Control with Distrusted Receivers
Congestion control protocols rely on receivers to support fair bandwidth sharing. However, a receiver has incentives to elicit self-beneficial bandwidth allocations and hence may ...
Sergey Gorinsky, Sugat Jain, Harrick M. Vin