Sciweavers

986 search results - page 113 / 198
» Protecting the Intranet Against
Sort
View
CCS
2010
ACM
13 years 8 months ago
Dissent: accountable anonymous group messaging
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group's communication. Existing messaging protocol...
Henry Corrigan-Gibbs, Bryan Ford
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 8 months ago
Rebuilding for Array Codes in Distributed Storage Systems
In distributed storage systems that use coding, the issue of minimizing the communication required to rebuild a storage node after a failure arises. We consider the problem of repa...
Zhiying Wang, Alexandros G. Dimakis, Jehoshua Bruc...
COMCOM
2006
75views more  COMCOM 2006»
13 years 8 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
TCSV
2008
111views more  TCSV 2008»
13 years 8 months ago
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
Recently, a novel image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed based on two-dimensional (2-D) discrete prolate spheroidal sequences (DPSS). ...
Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Ch...
CN
2004
106views more  CN 2004»
13 years 8 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...