Sciweavers

21 search results - page 3 / 5
» How stable are large superpeer networks against attack
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
Practical Anonymity for the Masses with Mix-Networks
Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very dif...
Marc Rennhard, Bernhard Plattner
CCS
2009
ACM
14 years 2 months ago
On cellular botnets: measuring the impact of malicious devices on a cellular network core
The vast expansion of interconnectivity with the Internet and the rapid evolution of highly-capable but largely insecure mobile devices threatens cellular networks. In this paper,...
Patrick Traynor, Michael Lin, Machigar Ongtang, Vi...
NSDI
2008
13 years 10 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
CCS
2003
ACM
14 years 29 days ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
IPSN
2005
Springer
14 years 1 months ago
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
— Sensor networks pose security and privacy challenges. One challenge is how to bootstrap secure communications among nodes. Several key pre-distribution schemes have been propos...
Zhen Yu, Yong Guan