Sciweavers

2421 search results - page 171 / 485
» Message from the Editor-in-Chief
Sort
View
CEAS
2007
Springer
14 years 5 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
ESORICS
2007
Springer
14 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICPADS
2006
IEEE
14 years 4 months ago
On the Effects of Consistency in Data Operations in Wireless Sensor Networks
In battery powered systems such as wireless sensor networks, energy efficiency is one of the most important system design goals. In this paper, energy efficiency is examined fro...
Kewei Sha, Weisong Shi
CSB
2005
IEEE
115views Bioinformatics» more  CSB 2005»
14 years 4 months ago
A New Clustering Strategy with Stochastic Merging and Removing Based on Kernel Functions
With hierarchical clustering methods, divisions or fusions, once made, are irrevocable. As a result, when two elements in a bottom-up algorithm are assigned to one cluster, they c...
Huimin Geng, Hesham H. Ali
MINENET
2005
ACM
14 years 4 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum