Sciweavers

1653 search results - page 164 / 331
» Timed analysis of security protocols
Sort
View
116
Voted
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
15 years 7 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
SWAT
1994
Springer
94views Algorithms» more  SWAT 1994»
15 years 7 months ago
On Self-Stabilizing Wait-Free Clock Synchronization
Protocols which can tolerate any number of processors failing by ceasing operation for an unbounded number of steps and resuming operation (with or) without knowing that they were...
Marina Papatriantafilou, Philippas Tsigas
105
Voted
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
15 years 9 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
PAM
2007
Springer
15 years 9 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
263
Voted
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 10 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...