Sciweavers

908 search results - page 173 / 182
» From communication networks to fuzzy sets
Sort
View
CSFW
2009
IEEE
15 years 6 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
GLOBECOM
2009
IEEE
15 years 6 months ago
Adaptive Dynamic Routing Supporting Service Management for Future Internet
— There is currently much debate in defining what form the Future Internet will take [22, 23, 24]. The current Internet is struggling to meet the needs of an ever-evolving societ...
Sasitharan Balasubramaniam, Dmitri Botvich, Ray Ca...
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 6 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
IMC
2009
ACM
15 years 6 months ago
Moving beyond end-to-end path information to optimize CDN performance
Replicating content across a geographically distributed set of servers and redirecting clients to the closest server in terms of latency has emerged as a common paradigm for impro...
Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srini...
ANCS
2006
ACM
15 years 5 months ago
CAMP: fast and efficient IP lookup architecture
A large body of research literature has focused on improving the performance of longest prefix match IP-lookup. More recently, embedded memory based architectures have been propos...
Sailesh Kumar, Michela Becchi, Patrick Crowley, Jo...