Sciweavers

2951 search results - page 410 / 591
» Secure Distributed DNS
Sort
View
ICDS
2009
IEEE
15 years 11 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
SAINT
2009
IEEE
15 years 11 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...
SP
2009
IEEE
15 years 11 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
15 years 11 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
INFOCOM
2009
IEEE
15 years 11 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer