Sciweavers

20511 search results - page 3935 / 4103
» On the level
Sort
View
IEEESP
2006
108views more  IEEESP 2006»
15 years 4 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
IJSNET
2008
118views more  IJSNET 2008»
15 years 4 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
CN
2007
95views more  CN 2007»
15 years 4 months ago
Quality-of-Service routing with path information aggregation
Most of the research proposals on Quality-of-Service (QoS) mechanisms have focused on providing guarantees in a single domain. Supporting QoS guarantees in the interdomain setting...
W.-Y. Tam, King-Shan Lui, Suleyman Uludag, Klara N...
CN
2007
133views more  CN 2007»
15 years 4 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
CN
2007
76views more  CN 2007»
15 years 4 months ago
A practical and robust inter-domain marking scheme for IP traceback
A practical and robust inter-domain marking scheme for IP traceback is proposed. We first identify six drawbacks of Probabilistic Packet Marking (PPM), and then contrive a synerg...
Zhiqiang Gao, Nirwan Ansari
« Prev « First page 3935 / 4103 Last » Next »