Sciweavers

12 search results - page 2 / 3
» Traffic Analysis: Protocols, Attacks, Design Issues, and Ope...
Sort
View

Publication
189views
15 years 3 months ago
Packet Trains-Measurements and a New Model for Computer Network Traffic
Traffic measurements on a ring local area computer network at the Massachusetts Institute of Technology are presented. The analysis of the arrival pattern shows that the arrival pr...
R. Jain, S. Routhier
SECON
2010
IEEE
13 years 2 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
USS
2004
13 years 6 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
ESCIENCE
2006
IEEE
13 years 8 months ago
Designing Workflow Components for e-Science
In this paper we present a general domain for the analysis of workflows and workflow components based on the notion of a collection of Turing machines sharing a set of tapes. We s...
Frank Terpstra, Pieter W. Adriaans
JUCS
2008
113views more  JUCS 2008»
13 years 4 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella