Sciweavers

5234 search results - page 103 / 1047
» Simulation of Computer Network Attacks
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
DATE
2006
IEEE
127views Hardware» more  DATE 2006»
14 years 3 months ago
Software implementation of Tate pairing over GF(2m)
Recently, the interest about the Tate pairing over binary fields has decreased due to the existence of efficient attacks to the discrete logarithm problem in the subgroups of su...
Guido Bertoni, Luca Breveglieri, Pasqualina Fragne...
LCN
2003
IEEE
14 years 2 months ago
Simulation Evaluation of Wireless Web Performance in an IEEE 802.11b Classroom Area Network
This paper presents a simulation study of an IEEE 802.11b wireless LAN (WLAN) used as a classroom area network. The simulation is conducted using OPNET Mod
Guangwei Bai, Carey L. Williamson
CCGRID
2005
IEEE
14 years 2 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
14 years 2 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young