Sciweavers

53 search results - page 6 / 11
» XML Rewriting Attacks: Existing Solutions and their Limitati...
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 7 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
IJSN
2006
65views more  IJSN 2006»
13 years 7 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
14 years 1 months ago
A Nested Relational Approach to Processing SQL Subqueries
One of the most powerful features of SQL is the use of nested queries. Most research work on the optimization of nested queries focuses on aggregate subqueries. However, the solut...
Bin Cao, Antonio Badia
IWSEC
2010
Springer
13 years 6 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis