Sciweavers

197 search results - page 13 / 40
» Is attack better than defense
Sort
View
USS
2008
13 years 9 months ago
Highly Predictive Blacklisting
The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
Jian Zhang, Phillip A. Porras, Johannes Ullrich
CRYPTO
1997
Springer
108views Cryptology» more  CRYPTO 1997»
13 years 11 months ago
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
: The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protec...
Thomas A. Berson
SYNTHESE
2008
51views more  SYNTHESE 2008»
13 years 7 months ago
Rebutting formally valid counterexamples to the Humean "is-ought" dictum
Various formally valid counterexamples have been adduced against the Humean dictum that one cannot derive an "ought" from an "is." There are formal rebuttals--s...
Daniel Guevara
NSDI
2008
13 years 9 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 7 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...