Sciweavers

912 search results - page 148 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
88
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Inferring Internet Worm Temporal Characteristics
— Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms...
Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou,...
ACNS
2008
Springer
252views Cryptology» more  ACNS 2008»
15 years 4 months ago
Generic Constructions of Stateful Public Key Encryption and Their Applications
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new ...
Joonsang Baek, Jianying Zhou, Feng Bao
76
Voted
ADHOC
2007
109views more  ADHOC 2007»
14 years 9 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang
88
Voted
COMSWARE
2007
IEEE
15 years 1 months ago
An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxybased...
Abhishek Gupta, Pavan Nuggehalli, Joy Kuri
DISCEX
2003
IEEE
15 years 3 months ago
ANON: An IP-Layer Anonymizing Infrastructure
This exhibition demonstrates an IP-layer anonymizing infrastructure, called ANON, which allows server addresses to be hidden from clients and vice versa. In providing address anon...
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott Br...