Sciweavers

947 search results - page 41 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
SAINT
2008
IEEE
15 years 7 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
CCR
2010
179views more  CCR 2010»
15 years 1 months ago
An argument for increasing TCP's initial congestion window
TCP flows start with an initial congestion window of at most four segments or approximately 4KB of data. Because most Web transactions are short-lived, the initial congestion wind...
Nandita Dukkipati, Tiziana Refice, Yuchung Cheng, ...
IADIS
2003
15 years 2 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
ACSAC
2008
IEEE
15 years 7 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
ICSE
1993
IEEE-ACM
15 years 5 months ago
A Comprehensive Process Model for Studying Software Process Papers
E cient and e ective studying of scienti c papers is an important part of software engineering education. Moreover, it contributes to the knowledge necessary to carry out software...
Rudolf K. Keller, Richard Lajoie, Nazim H. Madhavj...