Sciweavers

2699 search results - page 426 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
CACM
2004
212views more  CACM 2004»
13 years 9 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
INFFUS
2002
162views more  INFFUS 2002»
13 years 8 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
PVLDB
2008
138views more  PVLDB 2008»
13 years 8 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
TPDS
2010
99views more  TPDS 2010»
13 years 7 months ago
Snoogle: A Search Engine for Pervasive Environments
—Embedding small devices into everyday objects like toasters and coffee mugs creates a wireless network of objects. These embedded devices can contain a description of the underl...
Haodong Wang, Chiu Chiang Tan, Qun Li
GLOBECOM
2010
IEEE
13 years 7 months ago
Credit-Based Mechanism Protecting Multi-Hop Wireless Networks from Rational and Irrational Packet Drop
The existing credit-based mechanisms mainly focus on stimulating the rational packet droppers to relay other nodes' packets, but they cannot identify the irrational packet dro...
Mohamed Elsalih Mahmoud, Xuemin Shen