Sciweavers

298 search results - page 28 / 60
» Computer security: quality rather than quantity
Sort
View
RAID
2007
Springer
14 years 4 months ago
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
Matthias Vallentin, Robin Sommer, Jason Lee, Craig...
GCC
2005
Springer
14 years 3 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
IH
2001
Springer
14 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
TDP
2010
166views more  TDP 2010»
13 years 4 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
DAGSTUHL
2008
13 years 11 months ago
Fast (Parallel) Dense Linear System Solvers in C-XSC Using Error Free Transformations and BLAS
Existing selfverifying solvers for dense linear (interval-)systems in C-XSC provide high accuracy, but are rather slow. A new set of solvers is presented, which are a lot faster th...
Walter Krämer, Michael Zimmer