Sciweavers

1208 search results - page 198 / 242
» Channel abstractions for network security
Sort
View
WCNC
2008
IEEE
15 years 4 months ago
An Opportunistic Scheduling Scheme with Minimum Data-Rate Guarantees for OFDMA
Abstract—We tackle the problem of providing minimum datarate guarantees for different classes-of-service in an OFDMAbased network, while obtaining a high system throughput. Our a...
Razvan Pitic, Antonio Capone
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 4 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler
KES
2005
Springer
15 years 3 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
BIRTHDAY
2003
Springer
15 years 3 months ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
15 years 2 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing