Sciweavers

2904 search results - page 396 / 581
» Internet Infrastructure Security
Sort
View
AGENTS
1999
Springer
15 years 8 months ago
Shopbot Economics
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
Jeffrey O. Kephart, Amy R. Greenwald
AGENTS
1997
Springer
15 years 8 months ago
Yenta: A Multi-Agent, Referral-Based Matchmaking System
Many important and useful applications for software agents require multiple agents on a network that communicate with each other. Such agents must find each other and perform a u...
Leonard N. Foner
CCS
1994
ACM
15 years 8 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
CCS
2008
ACM
15 years 6 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
COMPUTER
2008
86views more  COMPUTER 2008»
15 years 4 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin