Sciweavers

1624 search results - page 266 / 325
» Fairness in multi-agent systems
Sort
View
ESORICS
2012
Springer
13 years 7 days ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
SOSP
2003
ACM
15 years 6 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
IJMMS
2008
60views more  IJMMS 2008»
14 years 9 months ago
In praise of forgiveness: Ways for repairing trust breakdowns in one-off online interactions
Online offences are generally considered as frequent and intentional acts performed by a member with the aim to deceive others. However, an offence may also be unintentional or ex...
Asimina Vasalou, Astrid Hopfensitz, Jeremy V. Pitt
IPPS
2007
IEEE
15 years 4 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai

Publication
448views
16 years 8 months ago
Congestion Control using Multilevel Explicit Congestion Notification
Congestion remains one of the main obstacles to the Quality of Service (QoS) on the Internet. We think that a good solution to Internet congestion should optimally combine congesti...
Arjan Durresi, Leonard Barolli, Raj Jain, Makoto T...