Sciweavers

259 search results - page 43 / 52
» Experimenting with multipath TCP
Sort
View
ESORICS
2007
Springer
15 years 5 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
PAM
2007
Springer
15 years 5 months ago
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
GLOBECOM
2006
IEEE
15 years 5 months ago
Logical Topology Design and Interface Assignment for Multi-Channel Wireless Mesh Networks
Abstract— A multi-channel wireless mesh network (MCWMN) consists of a number of stationary wireless routers, where each router is equipped with multiple network interface cards (...
Amir Hamed Mohsenian Rad, Vincent W. S. Wong
ACISICIS
2005
IEEE
15 years 5 months ago
Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
NDSS
2005
IEEE
15 years 5 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang