Sciweavers

5234 search results - page 116 / 1047
» Simulation of Computer Network Attacks
Sort
View
JCM
2008
73views more  JCM 2008»
13 years 9 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
14 years 2 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
JOC
2006
71views more  JOC 2006»
13 years 9 months ago
Private Computation: k-Connected versus 1-Connected Networks
We study the role of connectivity of communication networks in private computations under information theoretic settings. It will be shown that some functions can be computed by pr...
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
INFOCOM
2002
IEEE
14 years 2 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
EIT
2008
IEEE
13 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno