Building realistic Internet topologies is an important step towards predicting the behavior of new distributed applications and protocols. We are creating topologies that predict ...
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
Internet telephony must offer the standard telephony services. However, the transition to Internetbased telephony services also provides an opportunity to create new services more...
Operating a cluster on a single IP address is required when the cluster is used to provide certain Internet services. This paper proposes SAPS, a new method to assign a single IP ...
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...