Sciweavers

1630 search results - page 159 / 326
» Secure Overlay Network Design
Sort
View
SC
2004
ACM
15 years 3 months ago
A Peer-to-Peer Replica Location Service Based on a Distributed Hash Table
A Replica Location Service (RLS) allows registration and discovery of data replicas. In earlier work, we proposed an RLS framework and described the performance and scalability of...
Min Cai, Ann L. Chervenak, Martin R. Frank
64
Voted
ISCC
2003
IEEE
15 years 3 months ago
Registration Frameworks For IP Mobility Agents Hierarchies
Mobile IP is a network layer solution to the wide-area mobility problem in the Internet. Mobility agents’ hierarchies and regional registrations have been introduced in the fore...
Ayman Abdel-Hamid, Hussein M. Abdel-Wahab
95
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
SACMAT
2003
ACM
15 years 3 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
CCS
2009
ACM
15 years 5 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft