Sciweavers

2958 search results - page 527 / 592
» Extending and Implementing RASP
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
14 years 3 months ago
Scalable Algorithms for Distribution Search
Distribution data naturally arise in countless domains, such as meteorology, biology, geology, industry and economics. However, relatively little attention has been paid to data m...
Yasuko Matsubara, Yasushi Sakurai, Masatoshi Yoshi...
ICIW
2009
IEEE
14 years 3 months ago
QoSMap: Achieving Quality and Resilience through Overlay Construction
We describe QoSMap, an overlay construction mechanism which computes high quality overlay networks for applications having stringent constraints on hop-degrading QoS metrics and p...
Jawwad Shamsi, Monica Brockmeyer
ATAL
2009
Springer
14 years 3 months ago
From DPS to MAS to ...: continuing the trends
The most important and interesting of the computing challenges we are facing are those that involve the problems and opportunities afforded by massive decentralization and disinte...
Michael N. Huhns
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev