Sciweavers

2503 search results - page 220 / 501
» Building Computer Network Attacks
Sort
View
DEBS
2009
ACM
15 years 9 months ago
Soft state in publish/subscribe
Building survivable content-based publish/subscribe systems is difficult. Every node in a distributed publish/subscribe system stores a significant amount of routing state which ...
Zbigniew Jerzak, Christof Fetzer
NDSS
2005
IEEE
15 years 8 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...
HUMO
2000
Springer
15 years 6 months ago
Hand Shape Estimation Using Image Transition Network
This paper presents a method of hand posture estimation from silhouette images taken by two cameras. First, we extract the silhouette contour for a pair of images. We construct an...
Yasushi Hamada, Nobutaka Shimada, Yoshiaki Shirai
PERCOM
2008
ACM
16 years 2 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
89
Voted
ICNP
2007
IEEE
15 years 8 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik