Sciweavers

2904 search results - page 429 / 581
» Internet Infrastructure Security
Sort
View
WPES
2006
ACM
15 years 9 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
CCS
2006
ACM
15 years 7 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2008
ACM
15 years 5 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
PAM
2009
Springer
15 years 10 months ago
Data Gathering in Optical Networks with the TL1 Toolkit
This paper describes a new tool for gathering (performance) data from optical network devices. During the last few years many National Research and Education Networks (NRENs) have ...
Ronald van der Pol, Andree Toonk
MOBICOM
2005
ACM
15 years 9 months ago
PeopleNet: engineering a wireless virtual social network
People often seek information by asking other people even when they have access to vast reservoirs of information such as the Internet and libraries. This is because people are gr...
Mehul Motani, Vikram Srinivasan, Pavan Nuggehalli