Sciweavers

2503 search results - page 53 / 501
» Building Computer Network Attacks
Sort
View
ISPDC
2006
IEEE
15 years 3 months ago
Using Overlay Networks to Build Operating System Services for Large Scale Grids
Using grid resources to execute scientific applications requiring a large amount of computing power is attractive but not easy from the user point of view. Vigne is a grid operati...
Emmanuel Jeanvoine, Louis Rilling, Christine Morin...
HOTI
2008
IEEE
15 years 4 months ago
Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics
We present a new monolithic silicon photonics technology suited for integration with standard bulk CMOS processes, which reduces costs and improves opto-electrical coupling compar...
Christopher Batten, Ajay Joshi, Jason Orcutt, Anat...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
ICPPW
2003
IEEE
15 years 3 months ago
Countering Rogues in Wireless Networks
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are...
Austin Godber, Partha Dasgupta
ICCCN
2008
IEEE
15 years 4 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar