Sciweavers

1278 search results - page 222 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
129
Voted
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
15 years 4 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
138
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
121
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
108
Voted
MOBICOM
2004
ACM
15 years 9 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
ITSSA
2006
97views more  ITSSA 2006»
15 years 3 months ago
Service Evolution in Bio-Inspired Communication Systems
: An autonomic network must work unsupervised, therefore must be able to respond to unpredictable situations. The BIONETS project is working towards resilient network services that...
Daniele Miorandi, Lidia Yamamoto, Paolo Dini