Sciweavers

12183 search results - page 92 / 2437
» Computers under Attacks!
Sort
View
IPPS
2003
IEEE
15 years 9 months ago
Dynamic Resource Discovery for Applications Survivability in Distributed Real-Time Systems
In this paper we propose a new resource discovery protocol, REALTOR, which is based on a combination of pullbased and push-based resource information dissemination. REALTOR has be...
Byung-Kyu Choi, Sangig Rho, Riccardo Bettati
IPTPS
2004
Springer
15 years 9 months ago
Robust Distributed Name Service
This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
Baruch Awerbuch, Christian Scheideler
CCS
2007
ACM
15 years 10 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
ISPA
2004
Springer
15 years 9 months ago
A Novel Technique for Detecting DDoS Attacks at Its Early Stage
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
Bin Xiao, Wei Chen, Yanxiang He
EUROCRYPT
2005
Springer
15 years 10 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu