Sciweavers

2503 search results - page 17 / 501
» Building Computer Network Attacks
Sort
View
FIRBPERF
2005
IEEE
235views Algorithms» more  FIRBPERF 2005»
15 years 3 months ago
Performance Model Building of Pervasive Computing
Performance model building is essential to predict the ability of an application to satisfy given levels of performance or to support the search for viable alternatives. Using aut...
Andrea D'Ambrogio, Giuseppe Iazeolla
93
Voted
IPPS
2006
IEEE
15 years 3 months ago
Improving cooperation in peer-to-peer systems using social networks
Rational and selfish nodes in P2P systems usually lack effective incentives to cooperate, contributing to the increase of free-riders, and degrading the system performance. Variou...
Wenyu Wang, Li Zhao, Ruixi Yuan
EUROPKI
2006
Springer
15 years 1 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
64
Voted
NDSS
2008
IEEE
15 years 4 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
CCR
2005
97views more  CCR 2005»
14 years 9 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin