Sciweavers

1381 search results - page 183 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
15 years 5 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
CCS
2005
ACM
15 years 4 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
IPOM
2009
Springer
15 years 3 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
DSOM
2009
Springer
15 years 5 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
SIGCOMM
2012
ACM
13 years 1 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...