Sciweavers

2503 search results - page 163 / 501
» Building Computer Network Attacks
Sort
View
DSOM
2003
Springer
15 years 7 months ago
An Epidemic Protocol for Managing Routing Tables in Very Large Peer-to-Peer Networks
Building self-maintained overlay networks for message routing has recently attracted significant research interest [5–9]. All suggested solutions have a common goal: To build an...
Spyros Voulgaris, Maarten van Steen
EUROCRYPT
2008
Springer
15 years 3 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
IPCCC
2006
IEEE
15 years 7 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
COMPLEXITY
2006
91views more  COMPLEXITY 2006»
15 years 1 months ago
The evolution of technology within a simple computer model
Technology--the collection of devices and methods available to human society--evolves by constructing new devices and methods from ones that previously exist, and in turn offering...
W. Brian Arthur, Wolfgang Polak
ACSAC
2007
IEEE
15 years 8 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...