Sciweavers

777 search results - page 75 / 156
» Secure broadcasting in large networks
Sort
View
ACMSE
2009
ACM
15 years 4 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
JNSM
2010
110views more  JNSM 2010»
14 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
14 years 11 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
CACM
2004
212views more  CACM 2004»
14 years 9 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
CORR
2008
Springer
96views Education» more  CORR 2008»
14 years 10 months ago
On the Superdistribution of Digital Goods
: Business models involving buyers of digital goods in the distribution process are called superdistribution schemes. We review the state-of-the art of research and application of ...
Andreas U. Schmidt