Sciweavers

1610 search results - page 287 / 322
» Identity Based Multisignatures
Sort
View
INFOSCALE
2009
ACM
14 years 3 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
ICRA
2008
IEEE
117views Robotics» more  ICRA 2008»
14 years 2 months ago
Kinematics and calibration of active cannulas
Abstract— Active cannulas are remotely actuated thin continuum robots with the potential to traverse narrow and winding environments without relying on “guiding” environmenta...
Robert J. Webster III, Joseph M. Romano, Noah J. C...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 2 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
ACSAC
2007
IEEE
14 years 2 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
GLOBECOM
2007
IEEE
14 years 2 months ago
A New Stochastic Admission Control Scheme for Wireless Networks
— In traditional call admission control (CAC) schemes, mobile users are always the passive roles during the admission procedures and the base station determines whether to admit o...
Xinbing Wang, Chen Zhuo, Youyun Xu, Ruhai Wang