Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 18 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
An Experimental Study of Internet Path Diversity

Several research studies have been devoted to improving the reliability and performance of the Internet by utilizing redundant communication paths between end points. Multihoming, coupled with intelligent route control, and overlay networks are two main ...

research-article
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs

This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and tree-based lookahead architectures. Intrusion detection for network ...

research-article
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)

An effective approach to phishing Web page detection is proposed, which uses Earth Mover's Distance (EMD) to measure Web page visual similarity. We first convert the involved Web pages into low resolution images and then use color and coordinate ...

research-article
Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems

With the prevalence of Internet services and the increase of their complexity, there is a growing need to improve their operational reliability and availability. While a large amount of monitoring data can be collected from systems for fault analysis, ...

research-article
Neural Network Techniques for Proactive Password Checking

This paper deals with the access control problem. We assume that valuable resources need to be protected against unauthorized users and that, to this aim, a password-based access control scheme is employed. Such an abstract scenario captures many ...

research-article
OACerts: Oblivious Attribute Certificates

We propose Oblivious Attribute Certificates (OACerts), an attribute certificate scheme in which a certificate holder can select which attributes to use and how to use them. In particular, a user can use attribute values stored in an OACert obliviously, ...

research-article
Reducing Data Cache Susceptibility to Soft Errors

Data caches are a fundamental component of most modern microprocessors. They provide for efficient read/write access to data memory. Errors occurring in the data cache can corrupt data values or state, and can easily propagate throughout the memory ...

research-article
Secure Bit: Transparent, Hardware Buffer-Overflow Protection

We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect against buffer overflow attacks on control data (return-address and function-pointer attacks in particular). Secure Bit provides a hardware bit to protect the ...

research-article
Secure Location Verification Using Radio Broadcast

Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially malicious prover is located in a designated area. The original solution ...

research-article
Securing Mobile Ad Hoc Networks with Certificateless Public Keys

This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in ...

article
2006 Annual Index

Comments

Please enable JavaScript to view thecomments powered by Disqus.