Sciweavers

1804 search results - page 27 / 361
» Measuring denial Of service
Sort
View
ICOIN
2007
Springer
14 years 3 months ago
On Modeling Counteraction against TCP SYN Flooding
One of the main problems of network security is Distributed Denial of Service (DDoS) caused by TCP SYN packet flooding. To counteract SYN flooding attack, several defense methods...
Vladimir V. Shakhov, Hyunseung Choo
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 2 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
ICDCSW
2002
IEEE
14 years 2 months ago
A Collaborative Infrastructure for Scalable and Robust News Delivery
In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-t...
Werner Vogels, Christopher Ré, Robbert van ...
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 1 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
ICICS
1997
Springer
14 years 1 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander