Sciweavers

1757 search results - page 301 / 352
» Secure Content Validation
Sort
View
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 6 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
HOTNETS
2010
14 years 6 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica
TON
2012
13 years 1 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
DAC
2009
ACM
15 years 6 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 5 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang