Sciweavers

5324 search results - page 872 / 1065
» Internet Security Protocols
Sort
View
71
Voted
IPOM
2007
Springer
15 years 7 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address prefix origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ā€...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
92
Voted
SOUPS
2006
ACM
15 years 6 months ago
Human selection of mnemonic phrase-based passwords
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to stre...
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
ANCS
2005
ACM
15 years 6 months ago
Architectural impact of stateful networking applications
The explosive and robust growth of the Internet owes a lot to the ā€end-to-end principleā€, which pushes stateful operations to the end-points. The Internet grew both in traffic...
Javier Verdú, Jorge García-Vidal, Ma...
MINENET
2005
ACM
15 years 6 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
92
Voted
SAC
2005
ACM
15 years 6 months ago
Supporting e-commerce systems formalization with choreography languages
E-commerce as well as B2B applications are essentially based on interactions between different people and organizations (e.g. industry, banks, customers) that usually exploit the ...
Mario Bravetti, Claudio Guidi, Roberto Lucchi, Gia...