Sciweavers

151 search results - page 20 / 31
» Flexible Alias Protection
Sort
View
CCS
2009
ACM
14 years 8 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
VTC
2007
IEEE
112views Communications» more  VTC 2007»
14 years 1 months ago
Unequal Importance Image Communication over Heterogeneous Networks
An unequal importance communication approach, for reliable and real-time image communication over heterogeneous networks and its applications in mobile communication systems is pre...
Mehdi Malboubi, Ahmad Bahai, Mustafa Ergen, Pravin...
VTS
2007
IEEE
203views Hardware» more  VTS 2007»
14 years 1 months ago
Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code
Conventional error correcting code (ECC) schemes used in memories and caches cannot correct double bit errors caused by a single event upset (SEU). As memory density increases, mu...
Avijit Dutta, Nur A. Touba
CEAS
2007
Springer
14 years 1 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton