Sciweavers

1123 search results - page 7 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
107
Voted
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 5 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
FM
2008
Springer
77views Formal Methods» more  FM 2008»
15 years 1 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
15 years 5 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
118
Voted
CCS
2008
ACM
15 years 1 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
78
Voted
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 6 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...