Sciweavers

35419 search results - page 80 / 7084
» How are we doing
Sort
View
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 9 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
114
Voted
HT
1999
ACM
15 years 7 months ago
Do you have the Time? Composition and Linking in Time-Based Hypermedia
Most hypermedia models and systems do not incorporate time explicitly. This prevents authors from having direct control over the temporal aspects of a presentation. In this paper ...
Lynda Hardman, Jacco van Ossenbruggen, K. Sjoerd M...
129
Voted
DSN
2009
IEEE
15 years 10 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
104
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Provider Provisioned Overlay Networks and Their Utility in DoS Defense
—The current overlay deployment model supports minimal or no involvement by ISPs in overlay deployment and operation. This model rules out a richer set of interactions between th...
Jinu Kurian, Kamil Saraç
ASPLOS
2009
ACM
16 years 4 months ago
Producing wrong data without doing anything obviously wrong!
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...