Sciweavers

1653 search results - page 175 / 331
» Timed analysis of security protocols
Sort
View
124
Voted
DAC
2007
ACM
15 years 7 months ago
Performance Analysis of FlexRay-based ECU Networks
It is now widely believed that FlexRay will emerge as the predominant protocol for in-vehicle automotive communication systems. As a result, there has been a lot of recent interes...
Andrei Hagiescu, Unmesh D. Bordoloi, Samarjit Chak...
134
Voted
ACSAC
2002
IEEE
15 years 8 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
124
Voted
AINA
2007
IEEE
15 years 10 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
85
Voted
CCS
2009
ACM
15 years 10 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
108
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li