Sciweavers

12183 search results - page 115 / 2437
» Computers under Attacks!
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
GLOBECOM
2009
IEEE
15 years 8 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
JCSS
2008
159views more  JCSS 2008»
15 years 4 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
COMPUTER
2008
86views more  COMPUTER 2008»
15 years 4 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
109
Voted
CVPR
2001
IEEE
16 years 6 months ago
Nine Points of Light: Acquiring Subspaces for Face Recognition under Variable Lighting
Kuang-Chih Lee, Jeffrey Ho, David J. Kriegman