Sciweavers

3751 search results - page 627 / 751
» Events in security protocols
Sort
View
SECURWARE
2007
IEEE
15 years 4 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
SOCA
2007
IEEE
15 years 4 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
CCS
2007
ACM
15 years 4 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
EUROPKI
2007
Springer
15 years 4 months ago
On Partial Anonymity in Secret Sharing
Abstract. Anonymous secret sharing schemes allow a secret to be recovered from shares regardless of the identity of shareholders. Besides being interesting in its own right, this p...
Vanesa Daza, Josep Domingo-Ferrer