Sciweavers

1630 search results - page 167 / 326
» Secure Overlay Network Design
Sort
View
NDSS
2002
IEEE
15 years 3 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
SOUPS
2009
ACM
15 years 4 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
CN
2007
117views more  CN 2007»
14 years 10 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
CCGRID
2006
IEEE
15 years 4 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
ACSAC
2003
IEEE
15 years 3 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella