In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
ct Information Integration is among the most important fields in information management. The problem of integrating data from diverse, possibly heterogeneous data sources is ubiqu...
Ioana Manolescu, Daniela Florescu, Donald Kossmann
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...