Sciweavers

15379 search results - page 31 / 3076
» Protecting users from
Sort
View
APNOMS
2009
Springer
15 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
DBSEC
2000
153views Database» more  DBSEC 2000»
14 years 11 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
EUROCRYPT
2010
Springer
15 years 2 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
WWW
2001
ACM
15 years 10 months ago
Protecting web servers from distributed denial of service attacks
Frank Kargl, Jörn Maier, Michael Weber
IEEEARES
2009
IEEE
15 years 4 months ago
Protecting Global and Static Variables from Buffer Overflow Attacks
Yves Younan, Frank Piessens, Wouter Joosen