Sciweavers

2804 search results - page 177 / 561
» Next Generation Internet
Sort
View
NETWORKING
2007
15 years 5 months ago
The TCP Minimum RTO Revisited
We re-examine the two reasons for the conservative 1-second Minimum TCP-RTO to protect against spurious timeouts: i) the OS clock granularity and ii) the Delayed ACKs. We find tha...
Ioannis Psaras, Vassilis Tsaoussidis
DIMVA
2006
15 years 5 months ago
Detecting Self-mutating Malware Using Control-Flow Graph Matching
Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern...
Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
133
Voted
ICISC
1998
99views Cryptology» more  ICISC 1998»
15 years 5 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
CCS
2010
ACM
15 years 4 months ago
Efficient sensor node authentication via 3GPP mobile communication networks
Energy efficiency is one of important issues in the resource contrained wireless sensor network. In this paper, we propose the authentication and key agreement protocol that effic...
Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Sh...
BMCBI
2008
84views more  BMCBI 2008»
15 years 4 months ago
DNAAlignEditor: DNA alignment editor tool
Background: With advances in DNA re-sequencing methods and Next-Generation parallel sequencing approaches, there has been a large increase in genomic efforts to define and analyze...
Hector Sanchez-Villeda, Steven G. Schroeder, Sherr...