Sciweavers

4241 search results - page 723 / 849
» A Knowledge-Based Software Information System
Sort
View
ICIW
2008
IEEE
14 years 4 months ago
Governed Content Distribution on DHT Based Networks
Abstract—Peer-to-Peer (P2P) systems are widely used for sharing digital items without structured metadata and in absence of any kind of digital rights management applied to the d...
Walter Allasia, Francesco Gallo, Marco Milanesio, ...
PIMRC
2008
IEEE
14 years 4 months ago
AuthScan: Enabling fast handoff across already deployed IEEE 802.11 wireless networks
Abstract—Handoff procedure in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). We hav...
Jaeouk Ok, Pedro Morales, Hiroyuki Morikawa
SECURWARE
2007
IEEE
14 years 4 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
CCS
2007
ACM
14 years 4 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
CCS
2007
ACM
14 years 4 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks