Sciweavers

499 search results - page 74 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICPP
2007
IEEE
15 years 6 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
15 years 6 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
EGOV
2007
Springer
15 years 6 months ago
Towards a Methodology for Designing E-Government Control Procedures
The EU is currently modernizing customs legislation and practices. Main pillars in the new vision are an intensive use of IT (Customs becomes eCustoms), partnerships between Custom...
Ziv Baida, Jianwei Liu, Yao-Hua Tan
103
Voted
IBPRIA
2007
Springer
15 years 6 months ago
Three-Dimensional Ultrasonic Assessment of Atherosclerotic Plaques
Carotid atherosclerosis is the most common life-threatening neurological disease and therefore an accurate assessment of atheromatous plaques is clinically important. Several studi...
José Seabra, João Sanches, Luí...
ICICS
2007
Springer
15 years 6 months ago
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots
Autonomous spreading malware in the form of worms or bots has become a severe threat in today’s Internet. Collecting the sample as early as possible is a necessary precondition f...
Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu ...