Sciweavers

832 search results - page 89 / 167
» Effect of Malicious Synchronization
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
ACSAC
2001
IEEE
14 years 1 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
CCGRID
2001
IEEE
14 years 1 months ago
Sabotage-Tolerance Mechanisms for Volunteer Computing Systems
In this paper, we address the new problem of protecting volunteer computing systems from malicious volunteers who submit erroneous results by presenting sabotagetolerance mechanis...
Luis F. G. Sarmenta
CCS
2010
ACM
14 years 1 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
APGV
2008
ACM
164views Visualization» more  APGV 2008»
14 years 12 hour ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...