Sciweavers

2409 search results - page 368 / 482
» Reverse engineering the Internet
Sort
View
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 11 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
CSE
2009
IEEE
15 years 11 months ago
Has Anyone Seen My Goose? Social Network Services in Developing Regions
Abstract— In developing regions, Internet connectivity is extremely poor, while mobile phone penetration is much higher. The inhabitants of developing conuntries still rely on tr...
Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft
COMPLEX
2009
Springer
15 years 11 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu
CSE
2008
IEEE
15 years 11 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
IEEEARES
2007
IEEE
15 years 10 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell