Sciweavers

1381 search results - page 164 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
106
Voted
PAM
2007
Springer
15 years 6 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
83
Voted
ICDCSW
2007
IEEE
15 years 7 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser
120
Voted
JCP
2007
154views more  JCP 2007»
15 years 20 days ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
111
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 20 days ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 5 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....