-
2
-
-
38049143003
-
-
Home
-
Hogwash Homepage http://hogwash.sourceforge.net/docs/overview.html (1999)
-
(1999)
Hogwash
-
-
-
3
-
-
37949004012
-
Application of hardware accelerated extensible network nodes for internet worm and virus protection
-
Kyoto, Japan
-
Lockwood, J.W., Moscola, J., Reddick, D., Kulig, M., Brooks, T.: Application of hardware accelerated extensible network nodes for internet worm and virus protection. In: International Working Conference on Active Networks (IWAN), Kyoto, Japan (2003)
-
(2003)
International Working Conference on Active Networks (IWAN)
-
-
Lockwood, J.W.1
Moscola, J.2
Reddick, D.3
Kulig, M.4
Brooks, T.5
-
4
-
-
18644376119
-
Internet worm and virus protection in dynamically reconfigurable hardware
-
Washington DC
-
Lockwood, J.W., Moscola, J., Kulig, M., Reddick, D., Brooks, T.: Internet worm and virus protection in dynamically reconfigurable hardware. In: Military and Aerospace Programmable Logic Device (MAPLD), Washington DC (2003) E10
-
(2003)
Military and Aerospace Programmable Logic Device (MAPLD)
-
-
Lockwood, J.W.1
Moscola, J.2
Kulig, M.3
Reddick, D.4
Brooks, T.5
-
5
-
-
84944030124
-
Deep packet inspection using parallel Bloom filters
-
Stanford, CA
-
Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.W.: Deep packet inspection using parallel Bloom filters. In: Hot Interconnects, Stanford, CA (2003) 44-51
-
(2003)
Hot Interconnects
, pp. 44-51
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.W.4
-
6
-
-
38049116743
-
-
Bellovin, S.M.: Distributed firewalls.; login: magazine, special issue on security (1999) 37-39
-
Bellovin, S.M.: Distributed firewalls.; login: magazine, special issue on security (1999) 37-39
-
-
-
-
7
-
-
0034449536
-
Implementing a distributed firewall
-
Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: ACM Conference on Computer and Communications Security. (2000) 190-199
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
9
-
-
14844320851
-
Design of a system for real-time worm detection
-
Stanford, CA
-
Madhusudan, B., Lockwood, J.: Design of a system for real-time worm detection. In: Hot Interconnects, Stanford, CA (2004) 77-83
-
(2004)
Hot Interconnects
, pp. 77-83
-
-
Madhusudan, B.1
Lockwood, J.2
-
11
-
-
0036802048
-
SCRIBE: A large-scale and decentralized application-level multicast infrastructure
-
To appear
-
Castro, M., Druschel, P., Kermarrec, A., Rowstron, A.: SCRIBE: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in communications (JSAC) (2002) To appear.
-
(2002)
IEEE Journal on Selected Areas in communications (JSAC)
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.3
Rowstron, A.4
-
12
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. Lecture Notes in Computer Science 2218 (2001) 329-350
-
(2001)
Lecture Notes in Computer Science
, vol.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
13
-
-
0041513339
-
-
Castro, M., Jones, M.B., Kermarrec, A., Rowstron, A., Theimer, Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: INFOCOM, San Francisco, CA (2003)
-
Castro, M., Jones, M.B., Kermarrec, A., Rowstron, A., Theimer, Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: INFOCOM, San Francisco, CA (2003)
-
-
-
-
14
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
Janakiraman, R., Waldvogel, M., Zhang, Q.: Indra: A peer-to-peer approach to network intrusion detection and prevention. In: Proceedings of IEEE WETICE 2003. (2003)
-
(2003)
Proceedings of IEEE WETICE
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
15
-
-
38049106575
-
-
home
-
Dshield homepage, http://www.dshield.org (1995)
-
(1995)
Dshield
-
-
-
17
-
-
18644375564
-
-
Song, H., Lu, J., Lockwood, J., Moscola, J.: Secure remote control of fieldprogrammable network devices. In: FCCM, Napa, CA (2004)
-
Song, H., Lu, J., Lockwood, J., Moscola, J.: Secure remote control of fieldprogrammable network devices. In: FCCM, Napa, CA (2004)
-
-
-
-
19
-
-
38049175878
-
Rosa: Realistic open security architecture for active networks
-
Zurich, Switzerland
-
Bagnulo, M., Alarcos, B., Caldern, M., Sedano, M.: Rosa: Realistic open security architecture for active networks. In: International Working Conference on Active Networks (IWAN), Zurich, Switzerland (2002)
-
(2002)
International Working Conference on Active Networks (IWAN)
-
-
Bagnulo, M.1
Alarcos, B.2
Caldern, M.3
Sedano, M.4
-
20
-
-
0004218915
-
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
-
Technical report, University of Maryland, Baltimore County
-
Cedilnik, A., Kagal, L., Perich, F., Undercoffer, J.L., Joshi, A.: A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. Technical report, University of Maryland, Baltimore County (2001)
-
(2001)
-
-
Cedilnik, A.1
Kagal, L.2
Perich, F.3
Undercoffer, J.L.4
Joshi, A.5
-
21
-
-
33645602931
-
SHOMAR: An Open Architecture for Distributed Intrusion Detection Services
-
Technical report, University of Maryland, Baltimore County
-
Undercoffer, J.L., Perich, F., Nicholas, C.: SHOMAR: An Open Architecture for Distributed Intrusion Detection Services. Technical report, University of Maryland, Baltimore County (2002)
-
(2002)
-
-
Undercoffer, J.L.1
Perich, F.2
Nicholas, C.3
-
23
-
-
84947294004
-
Modelling a public-key infrastructure
-
Bertino, E, ed, Proceedings of 1996 European Symposium on Research in Computer Security ESORICS' 96, of, Springer-Verlag
-
Maurer, U.: Modelling a public-key infrastructure. In Bertino, E., ed.: Proceedings of 1996 European Symposium on Research in Computer Security (ESORICS' 96). Volume 1146 of Lecture Notes in Computer Science., Springer-Verlag (1996) 325-350
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
-
26
-
-
18644368071
-
-
Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of bloom filters for string matchings. In: FCCM, Napa, CA (2004)
-
Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of bloom filters for string matchings. In: FCCM, Napa, CA (2004)
-
-
-
-
27
-
-
33746933411
-
A modular system for fpga-based tcp flow processing in high-speed networks
-
FPL, Antwerp, Belgium
-
Schuehler, D.V., Lockwood, J.: A modular system for fpga-based tcp flow processing in high-speed networks. In: Field Programmable Logic and Applications (FPL), Antwerp, Belgium (2004) 301-310
-
(2004)
Field Programmable Logic and Applications
, pp. 301-310
-
-
Schuehler, D.V.1
Lockwood, J.2
-
28
-
-
47049090114
-
Control and configuration software for a reconfigurable networking hardware platform
-
Napa, CA
-
Sproull, T., Lockwood, J.W., Taylor, D.E.: Control and configuration software for a reconfigurable networking hardware platform. In: IEEE Symposium on Field-Programmable Custom Computing Machines, (FCCM), Napa, CA (2002)
-
(2002)
IEEE Symposium on Field-Programmable Custom Computing Machines, (FCCM)
-
-
Sproull, T.1
Lockwood, J.W.2
Taylor, D.E.3
-
29
-
-
38049139941
-
-
Freepastry webpage. http://www.cs.rice.edu/cs/Systems/Pastry/FreePastry (2004)
-
(2004)
Freepastry webpage
-
-
-
31
-
-
84968322828
-
Decentralized Methods of Certification Authority Using the Digital Signature Schemes
-
Koga, S., Sakurai, K.: Decentralized Methods of Certification Authority Using the Digital Signature Schemes. In: 2nd Anual PKI Research Workshop Proceedings. (2003)
-
(2003)
2nd Anual PKI Research Workshop Proceedings
-
-
Koga, S.1
Sakurai, K.2
|