Sciweavers

499 search results - page 76 / 100
» A Study on Latent Vulnerabilities
Sort
View
SRDS
2006
IEEE
15 years 6 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
114
Voted
INFOSCALE
2006
ACM
15 years 6 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
117
Voted
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 6 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
72
Voted
WECWIS
2005
IEEE
86views ECommerce» more  WECWIS 2005»
15 years 6 months ago
The Evolution of Cooperation under Cheap Pseudonyms
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...
Michal Feldman, John Chuang
105
Voted
EDO
2005
Springer
15 years 6 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...