Sciweavers

212 search results - page 19 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
NSDI
2007
14 years 11 months ago
Mutually Controlled Routing with Independent ISPs
Abstract – We present Wiser, an Internet routing protocol that enables ISPs to jointly control routing in a way that produces efficient end-to-end paths even when they act in th...
Ratul Mahajan, David Wetherall, Thomas E. Anderson
87
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
GLOBECOM
2008
IEEE
15 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
IMC
2004
ACM
15 years 2 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
ICDCS
2006
IEEE
15 years 3 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang