Sciweavers

796 search results - page 9 / 160
» Spoofing prevention method
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 10 months ago
How to prevent type-flaw attacks on security protocols under algebraic properties
In this paper, we prove that type-tagging prevents type-flaw attacks on security protocols that use the Exclusive-OR operator as our main contribution. Our proof method is general ...
Sreekanth Malladi, Pascal Lafourcade
MMMACNS
2005
Springer
14 years 3 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
14 years 1 months ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
ECAI
2006
Springer
14 years 1 months ago
Prevention of Harmful Behaviors Within Cognitive and Autonomous Agents
Being able to ensure that a multiagent system will not generate undesirable behaviors is essential within the context of critical applications (embedded systems or real-time system...
Caroline Chopinaud, Amal El Fallah-Seghrouchni, Pa...
ICNSC
2007
IEEE
14 years 4 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen