Sciweavers

2209 search results - page 272 / 442
» Language Based Secure Communication
Sort
View
INFOCOM
2006
IEEE
15 years 9 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
110
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol
— The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol component in the IETF Next Steps In Signaling (NSIS) protocol stack t...
Xiaoming Fu, Henning Schulzrinne, Hannes Tschofeni...
132
Voted
ICICS
1999
Springer
15 years 8 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
148
Voted
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 7 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
ATAL
2008
Springer
15 years 5 months ago
Agent-community-network-based business matching and collaboration support system
Business matching and collaboration support systems are useful, in particular for small-and-medium companies. Most of them developed so far are based on the server-client architect...
Tsunenori Mine, Kosaku Kimura, Satoshi Amamiya, Ke...