Sciweavers

103 search results - page 12 / 21
» Microsoft's new window on security
Sort
View
HASE
2007
IEEE
14 years 4 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves
SP
2000
IEEE
14 years 1 months ago
A More Efficient Use of Delta-CRLs
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some e...
David A. Cooper
SOSP
2003
ACM
14 years 6 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
HPDC
2010
IEEE
13 years 11 months ago
AzureBlast: a case study of developing science applications on the cloud
Cloud computing has emerged as a new approach to large scale computing and is attracting a lot of attention from the scientific and research computing communities. Despite its gro...
Wei Lu, Jared Jackson, Roger S. Barga
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 9 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...