Sciweavers

483 search results - page 32 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ICC
2000
IEEE
124views Communications» more  ICC 2000»
15 years 1 months ago
A Fair Traffic Conditioner for the Assured Service in a Differentiated Services Internet
— A research issue under investigation in the context of differentiated services (DiffServ) is the fair distribution of bandwidth between aggregates sharing the same Assured Forw...
Ilias Andrikopoulos, Lloyd Wood, George Pavlou
103
Voted
LISA
2008
14 years 12 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong
COMCOM
2004
149views more  COMCOM 2004»
14 years 9 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
VTC
2007
IEEE
101views Communications» more  VTC 2007»
15 years 3 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
ICCSA
2005
Springer
15 years 3 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...