Sciweavers

1314 search results - page 239 / 263
» New Approaches for Virtual Private Network Design
Sort
View
NDSS
2008
IEEE
15 years 8 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
AOSD
2005
ACM
15 years 7 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
CCR
2002
113views more  CCR 2002»
15 years 1 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
WWIC
2004
Springer
124views Communications» more  WWIC 2004»
15 years 7 months ago
Mobility-Aware Rendezvous Point for Mobile Multicast Sources
: Current multicast routing protocols have not been designed for mobile nodes and especially roaming sources. Using the remote subscription as basis, we develop a new approach base...
Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdel...
98
Voted
GLOBECOM
2007
IEEE
15 years 8 months ago
A Novel OFDMA Ranging Method Exploiting Multiuser Diversity
This paper addresses initial ranging (uplink synchronization and power control) for TDD OFDMA systems. Exploiting the channel knowledge from the downlink channel together with ini...
Jianqiang Zeng, Hlaing Minn