Sciweavers

1112 search results - page 181 / 223
» On scalable attack detection in the network
Sort
View
NDSS
2002
IEEE
15 years 4 months ago
Experimenting with Server-Aided Signatures
This paper explores practical and conceptual implications of using Server-Aided Signatures (SAS). SAS is a signature method that relies on partially-trusted servers for generating...
Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
ISM
2006
IEEE
158views Multimedia» more  ISM 2006»
15 years 5 months ago
ASEKS: A P2P Audio Search Engine Based on Keyword Spotting
Currently, most search engines are text-based and their structures are centralized. These kinds of engine are sufficient for searching text information in Internet. However, while...
Ruizhi Ye, Yingchun Yang, Zhenyu Shan, Yiyan Liu, ...
ICALP
2009
Springer
16 years 1 days ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
HPCC
2005
Springer
15 years 5 months ago
Securing the MPLS Control Plane
— In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used...
Francesco Palmieri, Ugo Fiore
107
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 11 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi