Sciweavers

2503 search results - page 76 / 501
» Building Computer Network Attacks
Sort
View
ICNS
2006
IEEE
15 years 3 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
INFOCOM
2000
IEEE
15 years 2 months ago
RADAR: An In-Building RF-Based User Location and Tracking System
The proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location-aware systems and services. In this paper we present RAD...
Paramvir Bahl, Venkata N. Padmanabhan
NDSS
2000
IEEE
15 years 2 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
15 years 10 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent