Sciweavers

7329 search results - page 133 / 1466
» Network Extractor Protocols
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
15 years 3 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
15 years 2 months ago
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware
abstracting the operation of lower-level packet processing functions. The library synthesizes into field-programmable gate array (FPGA) logic and is utilized in a network platform ...
Florian Braun, John W. Lockwood, Marcel Waldvogel
ICNP
2009
IEEE
15 years 1 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
INFOCOM
2009
IEEE
15 years 10 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu
ICCCN
2007
IEEE
15 years 9 months ago
Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative
– Within the context of Tele-Laboratories for Education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple an...
Raul Wirz, Raúl Marín, José M...