Sciweavers

2503 search results - page 388 / 501
» Building Computer Network Attacks
Sort
View
RTAS
2010
IEEE
14 years 12 months ago
Multi-Application Deployment in Shared Sensor Networks Based on Quality of Monitoring
Abstract—Wireless sensor networks are evolving from dedicated application-specific platforms to integrated infrastructure shared by multiple applications. Shared sensor networks...
Sangeeta Bhattacharya, Abusayeed Saifullah, Chenya...
97
Voted
CCS
2007
ACM
15 years 7 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
15 years 7 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 7 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
DIM
2008
ACM
15 years 2 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le