Sciweavers

2139 search results - page 277 / 428
» Distributed computing and computer security education
Sort
View
CF
2005
ACM
15 years 5 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
WISEC
2010
ACM
15 years 3 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ICPP
2007
IEEE
15 years 9 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
HPDC
1998
IEEE
15 years 7 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
PODC
2010
ACM
15 years 7 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...