Sciweavers

318 search results - page 40 / 64
» A New Perspective on Internet Security using Insurance
Sort
View
ESORICS
2006
Springer
14 years 9 days ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
IC
2004
13 years 10 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...
BIOSURVEILLANCE
2007
Springer
14 years 2 months ago
Detecting Conserved RNA Secondary Structures in Viral Genomes: The RADAR Approach
Abstract. Conserved regions, or motifs, present among RNA secondary structures serve as a useful indicator for predicting the functionality of the RNA molecules. Automated detectio...
Mugdha Khaladkar, Jason T. L. Wang
ICISS
2005
Springer
14 years 2 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
TELSYS
2008
98views more  TELSYS 2008»
13 years 8 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo