Sciweavers

1653 search results - page 181 / 331
» Timed analysis of security protocols
Sort
View
126
Voted
CSREASAM
2006
15 years 4 months ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
106
Voted
CCS
2007
ACM
15 years 8 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
127
Voted
MICRO
2008
IEEE
159views Hardware» more  MICRO 2008»
15 years 9 months ago
A novel cache architecture with enhanced performance and security
—Caches ideally should have low miss rates and short access times, and should be power efficient at the same time. Such design goals are often contradictory in practice. Recent f...
Zhenghong Wang, Ruby B. Lee
147
Voted
CORR
2008
Springer
119views Education» more  CORR 2008»
15 years 2 months ago
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
: Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control...
Adrien van den Bossche, Thierry Val, Eric Campo
135
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 2 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt