Sciweavers

537 search results - page 40 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
IMC
2005
ACM
15 years 3 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
ISCC
2005
IEEE
15 years 3 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
NDSS
2003
IEEE
15 years 3 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
COMCOM
2006
86views more  COMCOM 2006»
14 years 10 months ago
Study on nominee selection for multicast congestion control
Nominee selection plays a key role in nominee-based congestion control, which is essential for multicast services to ensure fairness and congestion avoidance. Without valid design...
Feng Xie, Gang Feng, Chee Kheong Siew
ACMSE
2005
ACM
14 years 12 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin