Sciweavers

24529 search results - page 62 / 4906
» Computing on Authenticated Data
Sort
View
ITCC
2005
IEEE
14 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
PAM
2007
Springer
14 years 4 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
AINA
2006
IEEE
14 years 1 months ago
EC: an edge-based architecture against DDoS attacks and malware spread
The ability to limit unsolicited traffic in the Internet is important to defy DDoS attacks and to contain the spread of worms and viruses. The concept of capabilities, which requir...
Roger Karrer
KIVS
2007
Springer
14 years 4 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni