Sciweavers

912 search results - page 91 / 183
» Techniques for Securing Networks Against Criminal Attacks
Sort
View
VIZSEC
2004
Springer
15 years 3 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee
SASO
2007
IEEE
15 years 4 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
ESAS
2004
Springer
15 years 3 months ago
Secure AES Hardware Module for Resource Constrained Devices
Abstract. Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as...
Elena Trichina, Tymur Korkishko
WS
2006
ACM
15 years 3 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
PERCOM
2006
ACM
15 years 9 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...