Sciweavers

24188 search results - page 245 / 4838
» Computing on Encrypted Data
Sort
View
APNOMS
2008
Springer
15 years 5 months ago
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...
96
Voted
SNPD
2007
15 years 5 months ago
Parallel analysis of polymorphic viral code using automated deduction system
As malicious code has become more sophisticated and pervasive, faster and more effective system for forensics and prevention is important. Particularly, quick analysis of polymorp...
Ruo Ando
125
Voted
JCP
2006
135views more  JCP 2006»
15 years 3 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
121
Voted
DCC
2000
IEEE
15 years 3 months ago
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes
Due to the success of differential and linear attacks on a large number of encryption algorithms, it is importanttoinvestigaterelationshipsamongvariouscryptographic, includingdiffe...
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
114
Voted
RAID
2010
Springer
15 years 1 months ago
What Is the Impact of P2P Traffic on Anomaly Detection?
Abstract. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detectio...
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Kh...