Sciweavers

2503 search results - page 255 / 501
» Building Computer Network Attacks
Sort
View
IMC
2004
ACM
15 years 7 months ago
Introducing scalability in network measurement: toward 10 Gbps with commodity hardware
The capacity of today's network links, along with the heterogeneity of their traffic, is rapidly growing, more than the workstation’s processing power. This makes the task ...
Loris Degioanni, Gianluca Varenni
PERCOM
2008
ACM
16 years 1 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
CP
2007
Springer
15 years 8 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
IPCCC
2005
IEEE
15 years 7 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
125
Voted
ICN
2005
Springer
15 years 7 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar