Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
Abstract. This work describes schemes for distributing between n servers the evaluation of a function f which is an approximation to a random function, such that only authorized su...
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...