Sciweavers

7329 search results - page 332 / 1466
» Network Extractor Protocols
Sort
View
CCR
2002
113views more  CCR 2002»
15 years 4 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
JCM
2006
126views more  JCM 2006»
15 years 4 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
MOBICOM
2006
ACM
15 years 10 months ago
Advanced TCP evaluation testbed on mixed wired internet and satellite environments
In this paper, we present our Advanced TCP Evaluation Testbed on Mixed Wired Internet and Satellite Environments. Categories and Subject Descriptors C.2.2 [Network Protocols]:–A...
Rosario Firrincieli, Carlo Caini, Cesar Marcondes,...
WIOPT
2005
IEEE
15 years 10 months ago
Towards an Understanding of EASE and Its Properties
We propose a model under which several inherent properties of the Exponential Age SEarch routing protocol can be derived. By making simplifications on this model, we are able to ...
Stratis Ioannidis, Peter Marbach
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 11 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz