Sciweavers

5934 search results - page 68 / 1187
» Detecting a Network Failure
Sort
View
131
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 3 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
119
Voted
CRYPTO
1997
Springer
108views Cryptology» more  CRYPTO 1997»
15 years 8 months ago
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
: The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protec...
Thomas A. Berson
135
Voted
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 7 months ago
Fast Proactive Recovery from Concurrent Failures
Abstract-- Recovery of traffic in connectionless pure IP networks has traditionally been handled by a full re-convergence of the network state. This process operates in a time scal...
Audun Fosselie Hansen, Olav Lysne, Tarik Cicic, St...
NSDI
2008
15 years 6 months ago
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures
The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failur...
Chi Ho, Robbert van Renesse, Mark Bickford, Danny ...
118
Voted
ICCD
2002
IEEE
122views Hardware» more  ICCD 2002»
15 years 8 months ago
Cost-Effective Concurrent Test Hardware Design for Linear Analog Circuits
Concurrent detection of failures in analog circuits is becoming increasingly more important as safety-critical systems become more widespread. A methodology for the automatic desi...
Sule Ozev, Alex Orailoglu