Sciweavers

2601 search results - page 435 / 521
» Secure Rewarding Schemes
Sort
View
ACSAC
2005
IEEE
15 years 8 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 8 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
IPPS
2005
IEEE
15 years 8 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
ITCC
2005
IEEE
15 years 8 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
SAC
2005
ACM
15 years 8 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar users...
Huseyin Polat, Wenliang Du