Sciweavers

259 search results - page 14 / 52
» ccr 2008
Sort
View
CCR
2004
106views more  CCR 2004»
13 years 4 months ago
Beware of BGP attacks
This note attempts to raise awareness within the network research community about the security of the interdomain routing infrastructure. We identify several attack objectives and...
Ola Nordström, Constantinos Dovrolis
CCR
2000
111views more  CCR 2000»
13 years 4 months ago
Analysis of errors in network load measurements
The paper identifies elements in network monitoring systems that cause errors in the load measurements found in recent reports on network statistics from an academic backbone netw...
Stanislav Belenki, Sven Tafvelin
CCR
1999
92views more  CCR 1999»
13 years 4 months ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
CCR
2008
92views more  CCR 2008»
13 years 5 months ago
You must be joking...: interview this
The goal of this column this time was to address major scientific issues and propose novel scientific methods for doing the same thing under different names. However, it turned ou...
Michalis Faloutsos
CCR
2008
62views more  CCR 2008»
13 years 5 months ago
You must be joking...: cares about the endangered species
For those of us in academia, tenure is great. Unless you don't have it, in which case it pretty much sucks. In fact, it goes beyond sucking: it kills. Mainly your personal li...
Michalis Faloutsos