Sciweavers

28 search results - page 6 / 6
» Multipath TCP: Analysis, Design, and Implementation
Sort
View
ESORICS
2007
Springer
15 years 7 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
MOBISYS
2004
ACM
16 years 24 days ago
Divert: Fine-grained Path Selection for Wireless LANs
The performance of Wireless Local Area Networks (WLANs) often suffers from link-layer frame losses caused by noise, interference, multipath, attenuation, and user mobility. We obs...
Allen K. L. Miu, Godfrey Tan, Hari Balakrishnan, J...
EUROSYS
2007
ACM
15 years 10 months ago
Melange: creating a "functional" internet
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems...
Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scot...