Sciweavers

138 search results - page 13 / 28
» Packet forwarding with source verification
Sort
View
ANCS
2008
ACM
14 years 11 months ago
Data path credentials for high-performance capabilities-based networks
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any d...
Tilman Wolf
ENTCS
2006
128views more  ENTCS 2006»
14 years 9 months ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi
86
Voted
ICMCS
2008
IEEE
182views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Collaborative video streaming with Raptor network coding
We investigate the problem of collaborative video streaming with Raptor network coding over overlay networks. We exploit path and source diversity, as well as basic processing cap...
Nikolaos Thomos, Pascal Frossard
ICNP
2007
IEEE
15 years 4 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
73
Voted
ICIP
2006
IEEE
15 years 11 months ago
Rate-Distortion Optimized Streaming of Authenticated Video
Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....