Sciweavers

2503 search results - page 160 / 501
» Building Computer Network Attacks
Sort
View
HPDC
1998
IEEE
15 years 6 months ago
High-Speed, Wide Area, Data Intensive Computing: A Ten Year Retrospective
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data from around the world, as well as employing largescale computation. The...
William E. Johnston
SASN
2006
ACM
15 years 7 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
SIGCOMM
2010
ACM
15 years 1 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
WMCSA
2002
IEEE
15 years 6 months ago
The Location Stack: A Layered Model for Location in Ubiquitous Computing
Based on five design principles extracted from a survey of location systems, we present the Location Stack, a layered software engineering model for location in ubiquitous comput...
Jeffrey Hightower, Barry Brumitt, Gaetano Borriell...
IPPS
2008
IEEE
15 years 8 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu