Sciweavers

718 search results - page 111 / 144
» Security protocols, properties, and their monitoring
Sort
View
IBMRD
2011
112views more  IBMRD 2011»
14 years 9 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
CCGRID
2008
IEEE
15 years 8 months ago
An Autonomic Workflow Management System for Global Grids
Workflow Management System is generally utilized to define, manage and execute workflow applications on Grid resources. However, the increasing scale complexity, heterogeneity and...
Mustafizur Rahman 0003, Rajkumar Buyya
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 3 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
ESORICS
2003
Springer
15 years 7 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
SAINT
2008
IEEE
15 years 8 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...