Sciweavers

2904 search results - page 305 / 581
» Internet Infrastructure Security
Sort
View
144
Voted
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 9 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
WWCA
1998
Springer
15 years 9 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
WORM
2004
15 years 6 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
124
Voted
CORR
2006
Springer
96views Education» more  CORR 2006»
15 years 5 months ago
The Evolution of Cyberinsurance
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to ear...
Ruperto P. Majuca, William Yurcik, Jay P. Kesan
JCS
2011
138views more  JCS 2011»
14 years 7 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...