Sciweavers

5324 search results - page 718 / 1065
» Internet Security Protocols
Sort
View
CN
2004
148views more  CN 2004»
15 years 4 months ago
DSMCast: a scalable approach for DiffServ multicasting
One of the dominant questions facing the Internet today is, how can the network meet the needs of the users and their applications (QoS) while trying to keep such implementations s...
Aaron Striegel, G. Manimaran
CCR
2011
14 years 11 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
158
Voted
WWW
2011
ACM
14 years 11 months ago
Open and decentralized access across location-based services
Users now interact with multiple Location-Based Services (LBS) through a myriad set of location-aware devices and interfaces. However, current LBS tend to be centralized silos wit...
Yiming Liu, Rui Yang, Erik Wilde
ESORICS
2009
Springer
16 years 5 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
IEEEARES
2009
IEEE
15 years 11 months ago
Web Service Trust: Towards a Dynamic Assessment Framework
— Trust in software services is a key prerequisite for the success and wide adoption of Services-Oriented Computing (SOC) in an open Internet world. However, trust is poorly asse...
George Spanoudakis, Stephane LoPresti