Sciweavers

1281 search results - page 227 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
USS
2010
13 years 6 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 2 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle
ATAL
2007
Springer
14 years 2 months ago
SSDPOP: improving the privacy of DCOP with secret sharing
Multi-agent systems designed to work collaboratively with groups of people typically require private information that people will entrust to them only if they have assurance that ...
Rachel Greenstadt, Barbara J. Grosz, Michael D. Sm...
APNOMS
2009
Springer
14 years 3 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong
IPMU
2010
Springer
13 years 7 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...