Sciweavers

24 search results - page 5 / 5
» Exploiting Empirical Engagement in Authentication Protocol D...
Sort
View
CNSR
2006
IEEE
132views Communications» more  CNSR 2006»
14 years 1 months ago
SCTP Multihoming Support for Handoffs across Heterogeneous Networks
Next-generation mobile terminals are expected to provide users with seamless, uninterrupted network connectivity while moving across wide geographic locations. Achieving continuou...
Farhan Siddiqui, Sherali Zeadally
CCS
2003
ACM
14 years 18 days ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CORR
2011
Springer
164views Education» more  CORR 2011»
12 years 11 months ago
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Network virtualization allows one to build dynamic distributed systems in which resources can be dynamically allocated at locations where they are most useful. In order to fully e...
Dushyant Arora, Marcin Bienkowski, Anja Feldmann, ...