Sciweavers

1970 search results - page 19 / 394
» Security Without Firewalls
Sort
View
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 27 days ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
SAC
2010
ACM
14 years 2 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
14 years 1 months ago
A Dynamic Stateful Multicast Firewall
—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...
CIIT
2007
133views Communications» more  CIIT 2007»
13 years 9 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
IMCS
2008
58views more  IMCS 2008»
13 years 7 months ago
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Purpose
Yoones Asgharzadeh Sekhavat, Mohammad Fathian