Sciweavers

1123 search results - page 48 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
15 years 4 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
CCS
2007
ACM
15 years 6 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
IAJIT
2008
145views more  IAJIT 2008»
14 years 12 months ago
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks
: A Mobile Ad Hoc Network (MANET) represents a system of wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies without...
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md...
WSC
1997
15 years 1 months ago
Simulation of Modern Parallel Systems: A CSIM-based Approach
Components of modern parallel systems are becoming quite complex with many features and variations. An integrated modeling of these components (interconnection network, messaging ...
Dhabaleswar K. Panda, Debashis Basak, Donglai Dai,...