Sciweavers

2058 search results - page 55 / 412
» Concast: Design and Implementation of a New Network Service
Sort
View
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 5 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
ICC
2008
IEEE
163views Communications» more  ICC 2008»
15 years 6 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
WWW
2005
ACM
16 years 15 days ago
Multi-step media adaptation: implementation of a knowledge-based engine
Continuing changes in the domains of consumer devices and multimedia formats demand for a new approach to media adaptation. The publication of customized content on a device requi...
Peter Soetens, Matthias De Geyter
WISEC
2009
ACM
15 years 6 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
SOSP
2005
ACM
15 years 8 months ago
Fault-scalable Byzantine fault-tolerant services
A fault-scalable service can be configured to tolerate increasing numbers of faults without significant decreases in performance. The Query/Update (Q/U) protocol is a new tool t...
Michael Abd-El-Malek, Gregory R. Ganger, Garth R. ...