Sciweavers

1779 search results - page 183 / 356
» Secure Communications in ATM Networks
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Fault Effects in FlexRay-Based Networks with Hybrid Topology
This paper investigates fault effects and error propagation in a FlexRay-based network with hybrid topology that includes a bus subnetwork and a star subnetwork. The investigation...
Mehdi Dehbashi, Vahid Lari, Seyed Ghassem Miremadi...
ICISC
2008
89views Cryptology» more  ICISC 2008»
15 years 6 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
SAC
2010
ACM
15 years 11 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
ACMSE
2007
ACM
15 years 8 months ago
Honeypots: concepts, approaches, and challenges
Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the exi...
Iyatiti Mokube, Michele Adams
CCS
2010
ACM
15 years 4 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers