Sciweavers

212 search results - page 15 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
USENIX
2004
14 years 10 months ago
Early Experience with an Internet Broadcast System Based on Overlay Multicast
In this paper, we report on experience in building and deploying an operational Internet broadcast system based on Overlay Multicast. In over a year, the system has been providing...
Yang-Hua Chu, Aditya Ganjam, T. S. Eugene Ng, Sanj...
CSFW
2012
IEEE
12 years 12 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
82
Voted
CCR
2000
121views more  CCR 2000»
14 years 9 months ago
mmdump: a tool for monitoring internet multimedia traffic
Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics o...
Jacobus E. van der Merwe, Ramón Cáce...
ICNP
2006
IEEE
15 years 3 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
NDSS
2008
IEEE
15 years 3 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor