Sciweavers

212 search results - page 24 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
ICPPW
1999
IEEE
15 years 1 months ago
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System
A distributed WWW caching system based on Internet Cache Protocol (ICP) is a system where a cache of a single proxy server is shared by others. When a proxy server receives an HTT...
Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hid...
WWW
2009
ACM
15 years 10 months ago
A measurement-driven analysis of information propagation in the flickr social network
Online social networking sites like MySpace, Facebook, and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to viral marketing t...
Meeyoung Cha, Alan Mislove, P. Krishna Gummadi
SPW
2001
Springer
15 years 1 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 9 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...