Sciweavers

1278 search results - page 215 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
13 years 7 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
ICN
2005
Springer
14 years 2 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
JSAC
2007
224views more  JSAC 2007»
13 years 9 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
ICCCN
2008
IEEE
14 years 3 months ago
Group-Oriented Communication: Concept and Network Architecture
—In this paper, we propose a novel communication paradigm called group-oriented communication. Different from conventional unicast-based communications, group-oriented communicat...
Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsak...
IACR
2011
112views more  IACR 2011»
12 years 8 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss