Sciweavers

832 search results - page 57 / 167
» Effect of Malicious Synchronization
Sort
View
CCS
2010
ACM
13 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 7 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
ICDCS
2012
IEEE
12 years 10 days ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
ESORICS
2010
Springer
13 years 11 months ago
Optimistic Fair Exchange with Multiple Arbiters
Fair exchange is one of the most fundamental problems in secure distributed computation. Alice has something that Bob wants, and Bob has something that Alice wants. A fair exchang...
Alptekin Küpçü, Anna Lysyanskaya
CHI
2002
ACM
14 years 10 months ago
Towards time design: pacing of hypertext navigation by system response times
Two experiments investigated the effects of system response time (SRT) on hypertext navigation. Dependent variables were residence time, emotional strain and memory performance. A...
Herbert A. Meyer, Michael Hildebrandt