Sciweavers

1853 search results - page 313 / 371
» Cryptographic Protocols and Network Security
Sort
View
USITS
2003
15 years 5 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
CCS
1999
ACM
15 years 8 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
111
Voted
WS
2004
ACM
15 years 9 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 3 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
EUROCRYPT
2008
Springer
15 years 5 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup