Sciweavers

5891 search results - page 108 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
IEEEARES
2008
IEEE
15 years 10 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
HOTI
2008
IEEE
15 years 10 months ago
An Efficient Hardware-Based Multi-hash Scheme for High Speed IP Lookup
Socrates Demetriades, Michel Hanna, Sangyeun Cho, ...
113
Voted
ISPA
2007
Springer
15 years 10 months ago
A Hierarchical Care-of Prefix with BUT Scheme for Nested Mobile Networks
Ing-Chau Chang, Chia-Hao Chou, Lin-Huang Chang
HPDC
2005
IEEE
15 years 9 months ago
DHT overlay schemes for scalable p-range resource discovery
Liping Chen, K. Selçuk Candan, Jun'ichi Tat...