Sciweavers

2503 search results - page 256 / 501
» Building Computer Network Attacks
Sort
View
KES
2005
Springer
15 years 7 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
ESAS
2007
Springer
15 years 5 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
3DPVT
2006
IEEE
167views Visualization» more  3DPVT 2006»
15 years 8 months ago
Hierarchical Representation of Virtual Cities for Progressive Transmission over Networks
Interactive network-based navigation over large urban environments raises difficult problems due to the size and complexity of these scenes. In this paper, we present a clientser...
Jérôme Royan, R. Balter, Christian Bo...
MINENET
2006
ACM
15 years 8 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
CCS
2006
ACM
15 years 5 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch