Search Results - "Freiling, F.C."
-
1
Solving Consensus Using Structural Failure Models
Published in 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01-10-2006)“…Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually…”
Get full text
Conference Proceeding -
2
Advanced Evasive Data Storage in Sensor Networks
Published in 2007 International Conference on Mobile Data Management (01-05-2007)“…In case the data which is stored and processed in a sensor network has some value, it needs to be protected from unauthorized access through a security…”
Get full text
Conference Proceeding -
3
The Forensic Image Generator Generator (Forensig2)
Published in 2009 Fifth International Conference on IT Security Incident Management and IT Forensics (01-09-2009)“…We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can ldquoprogramrdquo certain user…”
Get full text
Conference Proceeding -
4
Modular Consensus Algorithms for the Crash-Recovery Model
Published in 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies (01-12-2009)“…In the crash-recovery failure model of asynchronous distributed systems, processes can temporarily stop to execute steps and later restart their computation…”
Get full text
Conference Proceeding -
5
Message-efficient omission-tolerant consensus with limited synchrony
Published in 2009 IEEE International Symposium on Parallel & Distributed Processing (01-05-2009)“…We study the problem of consensus in the general omission failure model, i.e., in systems where processes can crash and omit messages while sending or…”
Get full text
Conference Proceeding -
6
On the Effort to Create Smartphone Worms in Windows Mobile
Published in 2007 IEEE SMC Information Assurance and Security Workshop (01-06-2007)“…Compared to what we know about malware for desktop and server systems, we know almost nothing about malware for smartphones and similar mobile devices. With…”
Get full text
Conference Proceeding -
7
Design and Implementation of the Honey-DVD
Published in 2006 IEEE Information Assurance Workshop (2006)“…Honeynets are a valuable source of data about techniques, tactics and motives of attackers in the Internet, but up to now they have been notoriously difficult…”
Get full text
Conference Proceeding -
8
Authenticated query flooding in sensor networks
Published in Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06) (2006)“…We propose a novel mechanism for authentication of flooded queries in sensor networks. Each sensor can verify with certain probability that the query is sent…”
Get full text
Conference Proceeding