• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,254
Next 10 →

Secure Routing for Mobile Ad Hoc Networks

by Panagiotis Papadimitratos, Zygmunt Haas - MOBILE COMPUTING AND COMMUNICATIONS REVIEW , 2002
"... For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery and dat ..."
Abstract - Cited by 599 (14 self) - Add to MetaCart
and data forwarding be safeguarded. The discussed here Secure Routing Protocol (SRP) [1] counters malicious behavior that targets the discovery of topological informa- tion. The protection of the data transmission is a separate problem: an intermittently misbehaving attacker could first comply

Securing Storage of Data in Cloud Computing

by D. Dhayalan, S. Malcom
"... Abstract-----In this paper, a new data encoding scheme is proposed called layered interleaving. It provides good security. Thus, this extensive security and analysis of the performance shows that the proposed scheme is highly effective and efficient against Byzantine failure, the malicious data modi ..."
Abstract - Add to MetaCart
Abstract-----In this paper, a new data encoding scheme is proposed called layered interleaving. It provides good security. Thus, this extensive security and analysis of the performance shows that the proposed scheme is highly effective and efficient against Byzantine failure, the malicious data

Secure Execution Via Program Shepherding

by Vladimir Kiriansky , Derek Bruening, Saman Amarasinghe , 2002
"... We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Program shepherding provides three techniques as building blocks for security policies. First, shepherding can restrict execution privileges on the basis of code or ..."
Abstract - Cited by 308 (5 self) - Add to MetaCart
origins. This distinction can ensure that malicious code masquerading as data is never executed, thwarting a large class of security attacks. Second, shepherding can restrict control transfers based on instruction class, source, and target. For example, shepherding can forbid execution of shared library

Malicious Data Attacks on the Smart Grid

by Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong
"... Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the ..."
Abstract - Cited by 38 (6 self) - Add to MetaCart
Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so

Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts

by Fritz Hohl , 1998
"... . In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host. Th ..."
Abstract - Cited by 183 (5 self) - Add to MetaCart
. In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host

Ensuring data storage security in cloud computing

by Cong Wang, Qian Wang, Kui Ren, Wenjing Lou - in Proc. of IWQoS’09 , 2009
"... Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data cent ..."
Abstract - Cited by 84 (3 self) - Add to MetaCart
analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. I.

Homomorphic Token and Distributed Erasure-Code for cloud

by B. Anjani Kumar, K. Hari Prasad, C. Subash Ch
"... ABSTRACT: Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. Th ..."
Abstract - Add to MetaCart
. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

Secure Program Execution via Dynamic Information Flow Tracking

by G. Edward Suh, Jaewook Lee, Srinivas Devadas , 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract - Cited by 271 (3 self) - Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control

Spread Spectrum Watermarking: Malicious Attacks and Counterattacks

by Frank Hartung, Jonathan K. Su, Bernd Girod , 1999
"... Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented ..."
Abstract - Cited by 82 (10 self) - Add to MetaCart
and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we systematically review proposed attacks on spread

Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

by Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang Tong
"... The problem of constructing malicious data attack of smart grid state estimation is considered together with countermeasures that detect the presence of such attacks. For the adversary, using a graph theoretic approach, an efficient algorithm with polynomial-time complexity is obtained for the desig ..."
Abstract - Cited by 40 (6 self) - Add to MetaCart
The problem of constructing malicious data attack of smart grid state estimation is considered together with countermeasures that detect the presence of such attacks. For the adversary, using a graph theoretic approach, an efficient algorithm with polynomial-time complexity is obtained
Next 10 →
Results 1 - 10 of 2,254
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University