Sciweavers

135 search results - page 23 / 27
» Cryptographic Protocol Analysis on Real C Code
Sort
View
ALGORITHMICA
2002
83views more  ALGORITHMICA 2002»
13 years 7 months ago
A Tutorial for Designing Flexible Geometric Algorithms
The implementation of an algorithm is faced with the issues efficiency, flexibility, and ease-of-use. In this paper, we suggest a design concept that greatly increases the flexibi...
Vikas Kapoor, Dietmar Kühl, Alexander Wolff
SIGCOMM
2004
ACM
14 years 26 days ago
Network sensitivity to hot-potato disruptions
Hot-potato routing is a mechanism employed when there are multiple (equally good) interdomain routes available for a given destination. In this scenario, the Border Gateway Protoc...
Renata Teixeira, Aman Shaikh, Timothy Griffin, Geo...
LCN
2005
IEEE
14 years 1 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
SASN
2006
ACM
14 years 1 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
14 years 1 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...