Sciweavers

2904 search results - page 294 / 581
» Internet Infrastructure Security
Sort
View
126
Voted
GCC
2005
Springer
15 years 10 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
ISSADS
2005
Springer
15 years 10 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
NORDSEC
2009
Springer
15 years 9 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
IADIS
2003
15 years 6 months ago
Anti-Sniffing in Unbounded Networks
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
ECIS
2000
15 years 6 months ago
Organizational, Technological and Regulatory Challenges for Realizing Electronic Government
In this paper we discuss the main challenges faced by electronic government initiatives. First, the components of and the demand for electronic government services are identified. ...
Georg Aichholzer, Rupert Schmutzer