Sciweavers

6555 search results - page 1290 / 1311
» Secure attribute-based systems
Sort
View
SRDS
2008
IEEE
14 years 4 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
COMSWARE
2007
IEEE
14 years 4 months ago
OASiS: A Programming Framework for Service-Oriented Sensor Networks
Abstract— Wireless sensor networks consist of small, inexpensive devices which interact with the environment, communicate with each other, and perform distributed computations in...
Manish Kushwaha, Isaac Amundson, Xenofon D. Koutso...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 4 months ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...
DRM
2007
Springer
14 years 4 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
14 years 4 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
« Prev « First page 1290 / 1311 Last » Next »