Sciweavers

4263 search results - page 726 / 853
» Network Security
Sort
View
91
Voted
ICDCS
1996
IEEE
15 years 2 months ago
Route Optimization and Location Updates for Mobile Hosts
Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts a...
Weidong Chen, Eric C. Lin
65
Voted
USENIX
2008
15 years 15 days ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
84
Voted
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 5 days ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
85
Voted
NSDI
2010
14 years 11 months ago
Experiences with CoralCDN: A Five-Year Operational View
CoralCDN is a self-organizing web content distribution network (CDN). Publishing through CoralCDN is as simple as making a small change to a URL's hostname; a decentralized D...
Michael J. Freedman
74
Voted
DIMVA
2006
14 years 11 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...