Sciweavers

6164 search results - page 1127 / 1233
» Teaching Computer Security
Sort
View
126
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
HAPTICS
2006
IEEE
15 years 9 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 9 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
124
Voted
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICNP
2006
IEEE
15 years 9 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
« Prev « First page 1127 / 1233 Last » Next »