Sciweavers

Share
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
9 years 8 months ago
Evaluation of JPEG2000 hashing for efficient authentication
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contai...
Dominik Engel, Thomas Stütz, Andreas Uhl
INFOCOM
2010
IEEE
9 years 9 months ago
Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System
—More fundamental than IP lookups and packet classification in routers is the extraction of fields such as IP Dest and TCP Ports that determine packet forwarding. While parsing...
Christos Kozanitis, John Huber, Sushil Singh, Geor...
ACSAC
2002
IEEE
10 years 3 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
SIGCOMM
2003
ACM
10 years 3 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
books