Sciweavers

1101 search results - page 120 / 221
» On the Security and Vulnerability of PING
Sort
View
SAINT
2008
IEEE
15 years 4 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
14 years 12 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
JSS
2006
65views more  JSS 2006»
14 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
TISSEC
2008
100views more  TISSEC 2008»
14 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
JAISE
2011
243views more  JAISE 2011»
14 years 4 months ago
Safeguards in a world of ambient intelligence: A social, economic, legal, and ethical perspective
The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, priv...
Egon L. van den Broek