Sciweavers

479 search results - page 90 / 96
» Lightweight Security for Network Coding
Sort
View
SIGCOMM
2003
ACM
15 years 4 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
FAST
2003
15 years 24 days ago
Pond: The OceanStore Prototype
OceanStore is an Internet-scale, persistent data store designed for incremental scalability, secure sharing, and long-term durability. Pond is the OceanStore prototype; it contain...
Sean C. Rhea, Patrick R. Eaton, Dennis Geels, Haki...
NETWORK
2008
150views more  NETWORK 2008»
14 years 11 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 5 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
MIDDLEWARE
2004
Springer
15 years 4 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira