Sciweavers

551 search results - page 24 / 111
» Probing TCP Implementations
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
USENIX
2008
14 years 2 days ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
TDP
2010
189views more  TDP 2010»
13 years 4 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
PAM
2012
Springer
12 years 5 months ago
Probe and Pray: Using UPnP for Home Network Measurements
Network measurement practitioners increasingly focus their interest on understanding and debugging home networks. The Universal Plug and Play (UPnP) technology holds promise as a h...
Lucas DiCioccio, Renata Teixeira, Martin May, Chri...
INFOCOM
1998
IEEE
14 years 2 months ago
Zero Queueing Flow Control and Applications
Zero Queueing Flow Control (ZQFC) is a new creditbased flow control method for ATM networks. The receiving node of such a flow-controlled link will have zero queueoccupancy in the...
H. T. Kung, Shie Yuan Wang