Sciweavers

537 search results - page 80 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
AINA
2010
IEEE
15 years 3 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
INFOCOM
2002
IEEE
15 years 3 months ago
Equation-Based Packet Marking for Assured Forwarding Services
Abstract— This paper introduces a new packet marking algorithm that can be used in the context of Assured Forwarding (AF) in the Differentiated Services (DiffServ) framework [1],...
Mohamed A. El-Gendy, Kang G. Shin
NOSSDAV
2009
Springer
15 years 3 months ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....
CLUSTER
2001
IEEE
15 years 2 months ago
SOVIA: A User-level Sockets Layer Over Virtual Interface Architecture
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible i...
Jin-Soo Kim, Kangho Kim, Sung-In Jung
JSAC
2006
172views more  JSAC 2006»
14 years 10 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu