Sciweavers

3486 search results - page 616 / 698
» On the Design and Security of RC2
Sort
View
ISCC
2005
IEEE
15 years 4 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
ISM
2005
IEEE
84views Multimedia» more  ISM 2005»
15 years 4 months ago
The Protection of QoS for Multimedia Transmission against Denial of Service Attacks
In this paper, a secure and adaptive multimedia transmission framework is proposed to maintain the quality of service (QoS) of the multimedia streams during the Denial-of-Service ...
Hongli Luo, Mei-Ling Shyu
ISSRE
2005
IEEE
15 years 4 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
15 years 4 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...
NDSS
2005
IEEE
15 years 4 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov