Sciweavers

6907 search results - page 895 / 1382
» Securing distributed adaptation
Sort
View
152
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ACSAC
2007
IEEE
15 years 10 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
138
Voted
CSFW
2007
IEEE
15 years 10 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
IEEEARES
2007
IEEE
15 years 10 months ago
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems
— The current standard for Fault-Tolerance in the Common Object Request Broker Architecture (CORBA) does not support network partitioning. However, distributed systems, and those...
Stefan Beyer, Francesc D. Muñoz-Escoí...
IEEEARES
2007
IEEE
15 years 10 months ago
Reputation Management Survey
Electronic markets, distributed peer-to-peer applications and other forms of online collaboration are all based on mutual trust, which enables transacting peers to overcome the un...
Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli