Sciweavers

1255 search results - page 76 / 251
» On Simple and Secure Key Distribution
Sort
View
110
Voted
JCS
1998
82views more  JCS 1998»
15 years 3 months ago
On SDSI's Linked Local Name Spaces
Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. Th...
Martín Abadi
USITS
2003
15 years 4 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
109
Voted
CSREASAM
2003
15 years 4 months ago
Defending Against Denial of Service Attacks Using Secure Name Resolution
This paper proposes a technique to foil DoS (Denial of Service) attacks. The proposed technique converts a static service to a relocating service and provides information of the n...
Prashant Dewan, Partha Dasgupta, Vijay Karamcheti
186
Voted
TON
2010
188views more  TON 2010»
14 years 10 months ago
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems
This paper presents "Self-Chord," a peer-to-peer (P2P) system that inherits the ability of Chord-like structured systems for the construction and maintenance of an overla...
Agostino Forestiero, Emilio Leonardi, Carlo Mastro...
CCS
2007
ACM
15 years 9 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...