Sciweavers

1278 search results - page 190 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
SAC
2010
ACM
14 years 4 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
SAC
2005
ACM
14 years 2 months ago
A distributed content-based search engine based on mobile code
Current search engines crawl the Web, download content, and digest this content locally. For multimedia content, this involves considerable volumes of data. Furthermore, this proc...
Volker Roth, Ulrich Pinsdorf, Jan Peters
TMA
2010
Springer
140views Management» more  TMA 2010»
13 years 7 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
ICUIMC
2009
ACM
14 years 3 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...