Sciweavers

4263 search results - page 604 / 853
» Network Security
Sort
View
IMC
2009
ACM
15 years 11 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
124
Voted
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
15 years 11 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
ICDCS
2008
IEEE
15 years 11 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
ESCIENCE
2007
IEEE
15 years 11 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
IAT
2007
IEEE
15 years 11 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...