Sciweavers

12183 search results - page 77 / 2437
» Computers under Attacks!
Sort
View
WS
2005
ACM
14 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
MUE
2007
IEEE
113views Multimedia» more  MUE 2007»
14 years 4 months ago
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo de...
Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
COMPUTER
2007
65views more  COMPUTER 2007»
13 years 10 months ago
Marking Technique to Isolate Boundary Router and Attacker
Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgal...
FC
2005
Springer
98views Cryptology» more  FC 2005»
14 years 3 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
IEEEARES
2006
IEEE
14 years 4 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti