Sciweavers

986 search results - page 107 / 198
» Protecting the Intranet Against
Sort
View
CCGRID
2002
IEEE
14 years 1 months ago
Maintaining Connectivity in a Scalable and Robust Distributed Environment
This paper describes a novel peer-to-peer (P2P) environment for running distributed Java applications on the Internet. The possible application areas include simple load balancing...
Márk Jelasity, Mike Preuß, Maarten va...
LCN
2002
IEEE
14 years 1 months ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju
WETICE
2002
IEEE
14 years 1 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
14 years 27 days ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
ACISP
1999
Springer
14 years 11 days ago
Evolution of Fair Non-repudiation with TTP
Non-repudiation turns out to be an increasingly important security service with the fast growth of electronic commerce on the Internet. Non-repudiation services protect the transac...
Jianying Zhou, Robert H. Deng, Feng Bao