Sciweavers

12183 search results - page 154 / 2437
» Computers under Attacks!
Sort
View
169
Voted
TMC
2011
164views more  TMC 2011»
14 years 12 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
PADS
2005
ACM
15 years 10 months ago
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known Internet worms, such as Code Red, Slammer, and Blaster, infected vulnerable computers by scanning the entire Internet IPv4 space. In this paper, we present a new s...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong...
IPPS
2009
IEEE
15 years 11 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
127
Voted
ICCV
2005
IEEE
15 years 10 months ago
Photometric Stereo under Perspective Projection
Photometric stereo is a fundamental approach in Computer Vision. At its core lies a set of image irradiance equations each taken with a different illumination. The vast majority o...
Ariel Tankus, Nahum Kiryati
CCS
2009
ACM
16 years 5 months ago
A new hash family obtained by modifying the SHA-2 family
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 des...
Somitra Kumar Sanadhya, Palash Sarkar