Sciweavers

21 search results - page 2 / 5
» Obfuscation of sensitive data in network flows
Sort
View
CONEXT
2010
ACM
13 years 7 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
CIKM
2009
Springer
14 years 4 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
GLOBECOM
2010
IEEE
13 years 7 months ago
Hybrid Window and Rate Based Congestion Control for Delay Sensitive Applications
There has been a dramatic increase in interactive cloud based software applications. Compared to classical realtime media applications (voice over IP (VoIP)/conferencing) and non r...
Sanjeev Mehrotra, Jin Li, Sudipta Sengupta, Manish...
DSOM
2003
Springer
14 years 3 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung