Sciweavers

518 search results - page 60 / 104
» Abstract Interpretation-Based Protection
Sort
View
CN
2008
100views more  CN 2008»
15 years 2 months ago
Packet forwarding with source verification
Abstract-- Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such ve...
Craig A. Shue, Minaxi Gupta, Matthew P. Davy
COMCOM
2006
75views more  COMCOM 2006»
15 years 2 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
TWC
2008
143views more  TWC 2008»
15 years 2 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
112
Voted
SIGCSE
2002
ACM
207views Education» more  SIGCSE 2002»
15 years 2 months ago
Exploration of process interaction in operating systems: a pipe-fork simulator
Abstract This paper examines the use of a simulator to explore process interaction in Unix. The simulator allows instructors to trace through a variety of programs and to show how ...
Steven Robbins
135
Voted
VTC
2010
IEEE
121views Communications» more  VTC 2010»
15 years 26 days ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen