Sciweavers

2503 search results - page 62 / 501
» Building Computer Network Attacks
Sort
View
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
PERCOM
2006
ACM
15 years 9 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...
IWCMC
2006
ACM
15 years 3 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 8 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
WONS
2005
IEEE
15 years 3 months ago
Building a Better Wireless Mousetrap: Need for More Realism in Simulations
Reliable network simulators are important tools for research and development in the field of wireless communication. Although the ns-2 simulator is quite popular for testing wire...
Matthias Wellens, Marina Petrova, Janne Riihij&aum...