Sciweavers

1123 search results - page 80 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
CANPC
1999
Springer
15 years 4 months ago
Implementing Application-Specific Cache-Coherence Protocols in Configurable Hardware
Streamlining communication is key to achieving good performance in shared-memory parallel programs. While full hardware support for cache coherence generally offers the best perfo...
David Brooks, Margaret Martonosi
CCS
2006
ACM
15 years 3 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CCR
2002
113views more  CCR 2002»
14 years 11 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
ESORICS
2010
Springer
15 years 29 days ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
WOWMOM
2006
ACM
149views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
On-Demand Reliable Medium Access in Sensor Networks
A wireless sensor network typically consists of a dense deployment of sensor nodes to achieve higher resolution and better network coverage. A dense network also increases the fau...
Ratnabali Biswas, Vivek Jain, Chittabrata Ghosh, D...