Sciweavers

441 search results - page 57 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
NDSS
2000
IEEE
15 years 4 months ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...
COMCOM
2008
91views more  COMCOM 2008»
14 years 12 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
ACSAC
2005
IEEE
15 years 5 months ago
TARP: Ticket-based Address Resolution Protocol
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...
Wesam Lootah, William Enck, Patrick McDaniel
SEMWEB
2004
Springer
15 years 5 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 3 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer