نتایج جستجو برای: byzantine attack

تعداد نتایج: 83821  

Calligraphy was very important from the beginning in Islamic civilization because of the Rasm of the Holy Quran. The presence and application of the Kufic script, as one of the most common forms of calligraphy in the early Islamic age, with its own visual and conceptual features in the Greek churches and monasteries of the tenth and eleventh centuries (fourth and fifth centuries (AH)) raises ma...

Journal: :CoRR 2010
Rajender Nath Pankaj Kumar Sehgal

Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attackswormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and per...

Journal: :Computers & Security 2011
Mirko Montanari Ellick Chan Kevin Larson Wucherl Yoo Roy H. Campbell

Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection. This paper presents Odessa, a resilient system for monitoring and validating compliance of networked systems to complex policies. To ...

2008
Kim Potter Kihlstrom Robin Elliott Kelsey Marshman Aaryn Smith

With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust in such systems and the vulnerability of such systems to attack provide motivation to develop protocols that are intrusion-tolerant and able to provide critical services even during an attack or in the presence of arbitrary fault...

Journal: :Blockchain: research and applications 2021

This paper investigates several voting consensus protocols with low computational complexity in noisy Byzantine infrastructures. Using computer simulations, we show that explicit randomization of the protocol can significantly increase robustness towards faulty and malicious nodes. We identify optimal amount randomness for various attack strategies on different kinds network topologies.

2011
S. Swarnalatha

We present a signaling architecture for network traffic authorization, Permissionbased Sending (PBS). This architecture aims to prevent Denial-of-Service (DoS) attacks and other forms of unauthorized traffic. Towards this goal, PBS takes a hybrid approach: a proactive approach of explicit permissions and a reactive approach of monitoring and countering attacks. On-path signaling is used to conf...

Journal: :باغ نظر 0
علیرضا نوروزی طلب

the byzantine art belogs to the world of christianity. the world of christianity has some characteristics which generally reflect the art works belonging to the christian era. any interpretation, critic and studies of the byzantine era art is possible only if it is done on the basis of knowing the world it belongs to. the core of chritian world is the sacred writ and the divine words. the adven...

2004
Jean-Philippe Martin Lorenzo Alvisi

A trustworthy networked information system (NIS) must continue to operate correctly even in the presence of environmental disruptions, human errors, and hostile attacks [10]—in other words, it must be both faulttolerant and secure. Reasoning about such a system is, unfortunately, very hard. Our limited success to date in building reliable NISs is an indication of the complexity involved with gu...

2011
JonCithan Herzog Gabriel Wachman Dan Liu

Cognitive networking mechanisms promise to greatly improve network performance over non~cognitive mechanisms, by making more efficient nse of bandwidth, spectrum, and power. However, these mechanisms must be designed v,'ilh cyber security in mind in order to rem~lin efficient in lhe presence of subverted, adversarial participants. In t.his paper, we demonstrate the susceptibility of two speciEc...

Journal: :Computer Communications 2007
Jang-Ping Sheu Jui-Che Cheng

When sensor networks deployed in unattended and hostile environments, for securing communication between sensors, secret keys must be established between them. Many key establishment schemes have been proposed for large scale sensor networks. In these schemes, each sensor shares a secret key with its neighbors via preinstalled keys. But it may occur that two end nodes which do not share a key w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید