Sciweavers

2057 search results - page 409 / 412
» Distributed Secure Systems: Then and Now
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Router primitives for programmable active measurement
Active probe-based measurements are the foundation for understanding important network path properties such as SLA compliance and available bandwidth. Well-known challenges in act...
Joel Sommers, Paul Barford, Mark Crovella
SRDS
2008
IEEE
14 years 2 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
INFOCOM
2005
IEEE
14 years 2 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
ISI
2005
Springer
14 years 2 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen