Sciweavers

2 search results - page 1 / 1
» Technology of Encrypted Tunnels with Practical Usage
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
13 years 11 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
JDFP
2006
139views more  JDFP 2006»
13 years 5 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer