Sciweavers

2237 search results - page 323 / 448
» On the Security of Random Sources
Sort
View
CCS
2010
ACM
14 years 10 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
SIGCOMM
2010
ACM
14 years 10 months ago
Accelerating SSL with GPUs
SSL/TLS is a standard protocol for secure Internet communication. Despite its great success, today's SSL deployment is largely limited to security-critical domains. The low a...
Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon...
ISI
2008
Springer
14 years 10 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
ISI
2008
Springer
14 years 10 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
JNCA
2007
75views more  JNCA 2007»
14 years 10 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du