Sciweavers

785 search results - page 118 / 157
» Cache Behavior of Network Protocols
Sort
View
WIOPT
2010
IEEE
15 years 21 days ago
Optimal revocations in ephemeral networks: A game-theoretic framework
—Revocation of public-key certificates is an important security primitive. In this paper, we design a fully distributed local certificate revocation scheme for ephemeral networ...
Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim ...
98
Voted
DFT
2003
IEEE
145views VLSI» more  DFT 2003»
15 years 7 months ago
System-Level Analysis of Fault Effects in an Automotive Environment
In the last years, new requirements in terms of vehicle performance increased significantly the amount of on-board electronics, thus raising more concern about safety and fault to...
Fulvio Corno, S. Tosato, P. Gabrielli
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 11 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
112
Voted
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 8 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
211
Voted

Publication
219views
17 years 23 days ago
Achieving QoS for TCP Traffic in Satellite Networks with Differentiated Services
Satellite networks play an indispensable role in providing global Internet access and electronic connectivity. To achieve such a global communications, provisioning of quality of s...
Arjan Durresi, Sastri Kota, Mukul Goyal, Raj Jain,...