Sciweavers

6555 search results - page 1299 / 1311
» Secure attribute-based systems
Sort
View
CONEXT
2007
ACM
14 years 17 days ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
EXPCS
2007
14 years 15 days ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...
SIGGRAPH
2010
ACM
14 years 15 days ago
Camera-less Smart Laser Projector
We introduce here our latest ‘smart laser projector’ prototype, i.e, a modified laser-based projector capable of augmenting all kind of surfaces while simultaneously using th...
Álvaro Cassinelli, Alexis Zerroug, Yoshihir...
ATC
2006
Springer
14 years 11 days ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
NGC
2000
Springer
14 years 6 days ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
« Prev « First page 1299 / 1311 Last » Next »