Sciweavers

14824 search results - page 2942 / 2965
» Security - Introduction
Sort
View
ITIIS
2010
172views more  ITIIS 2010»
14 years 9 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
JCS
2010
104views more  JCS 2010»
14 years 9 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JSAC
2010
107views more  JSAC 2010»
14 years 9 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
JTAER
2010
109views more  JTAER 2010»
14 years 9 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
JUCS
2010
124views more  JUCS 2010»
14 years 9 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
« Prev « First page 2942 / 2965 Last » Next »