Sciweavers

1101 search results - page 195 / 221
» On the Security and Vulnerability of PING
Sort
View
SAFECOMP
2004
Springer
15 years 3 months ago
How Explicit Are the Barriers to Failure in Safety Arguments?
Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnera...
Shamus P. Smith, Michael D. Harrison, Bastiaan A. ...
SEMWEB
2004
Springer
15 years 3 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
ICDCS
2003
IEEE
15 years 2 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
70
Voted
INFOCOM
2002
IEEE
15 years 2 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...