Sciweavers

1240 search results - page 215 / 248
» Trusted Design in FPGAs
Sort
View
SRDS
2006
IEEE
14 years 2 months ago
WRAPS: Denial-of-Service Defense through Web Referrals
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
XiaoFeng Wang, Michael K. Reiter
ACMSE
2006
ACM
14 years 2 months ago
Using genetic algorithms to generate test plans for functionality testing
Like in other fields, computer products (applications, hardware, etc.), before being marketed, require some level of testing to verify whether they meet their design and function...
Francisca Emanuelle Vieira, Francisco Martins, Raf...
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
ACSAC
2005
IEEE
14 years 2 months ago
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients
Client-server applications often do not scale well when a large number of clients access a single server. To solve this, a new trend is to allow a client to download data from oth...
Jun Li, Xun Kang