Skip to main content

and
Your search also matched 27 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating

Include preview-only content
  1. Chapter and Conference Paper

    Evaluation and Improvement of Generic-Emulating DPA Attacks

    At CT-RSA 2014, Whitnall, Oswald and Standaert gave the impossibility result that no generic DPA strategies (i.e., without any a priori knowledge about the leakage characteristics) can recover secret information ...

    Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo in Cryptographic Hardware and Embedded System… (2015)

  2. Chapter and Conference Paper

    Transient-Steady Effect Attack on Block Ciphers

    A new Transient-Steady Effect attack on block ciphers called TSE attack is presented in this paper. The concept of transient-steady effect denotes the phenomenon that the output of a combinational circuit keep...

    Yanting Ren, An Wang, Liji Wu in Cryptographic Hardware and Embedded Systems -- CHES 2015 (2015)

  3. Chapter and Conference Paper

    Enhancing Traffic Locality in BitTorrent via Shared Trackers

    The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). P2P locality has therefore been widely suggested to...

    Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu in NETWORKING 2012 (2012)

  4. Chapter and Conference Paper

    Degree and Principal Eigenvectors in Complex Networks

    The largest eigenvalue λ 1 of the adjacency matrix powerfully characterizes dynamic processes on networks, such as virus spread and synchronization. The minimization of the spectral radius by remo...

    Cong Li, Huijuan Wang, Piet Van Mieghem in NETWORKING 2012 (2012)

  5. Chapter and Conference Paper

    Sign What You Really Care about – Secure BGP AS Paths Efficiently

    The inter-domain routing protocol, Border Gateway Protocol (BGP), plays a critical role in the reliability of the Internet routing system, but forged routes generated by malicious attacks or mis-configurations...

    Yang **ang, Zhiliang Wang, Jian** Wu, **ngang Shi, **a Yin in NETWORKING 2012 (2012)

  6. Chapter and Conference Paper

    Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF

    Energy consumption has already become a major challenge to the current Internet. Most researches aim at lowering energy consumption under certain fixed performance constraints. Since trade-offs exist between n...

    Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong in NETWORKING 2012 (2012)

  7. Chapter and Conference Paper

    Scalable Telemetry Classification for Automated Malware Detection

    Industry reports and blogs have estimated the amount of malware based on known malicious files. This paper extends this analysis to the amount of unknown malware. The study is based on 26.7 million files referenc...

    Jack W. Stokes, John C. Platt, Helen J. Wang in Computer Security – ESORICS 2012 (2012)

  8. Chapter and Conference Paper

    Enhancing Peer-to-Peer Traffic Locality through Selective Tracker Blocking

    Peer-to-peer (P2P) applications, most notably BitTorrent (BT), are generating unprecedented traffic pressure to the Internet Service Providers (ISPs). To mitigate the costly inter-ISP traffic, P2P locality, wh...

    Haiyang Wang, Feng Wang, Jiangchuan Liu in NETWORKING 2011 (2011)

  9. Chapter and Conference Paper

    BotTrack: Tracking Botnets Using NetFlow and PageRank

    With large scale botnets emerging as one of the major current threats, the automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. Faced with high...

    Jérôme François, Shaonan Wang, Radu State, Thomas Engel in NETWORKING 2011 (2011)