Sciweavers

357 search results - page 60 / 72
» Performance Comparison of Security Mechanisms for Grid Servi...
Sort
View
CNSM
2010
14 years 10 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
MOBIHOC
2007
ACM
16 years 1 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ACSAC
2006
IEEE
15 years 7 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
OSDI
2008
ACM
16 years 1 months ago
Leveraging Legacy Code to Deploy Desktop Applications on the Web
Xax is a browser plugin model that enables developers to leverage existing tools, libraries, and entire programs to deliver feature-rich applications on the web. Xax employs a nov...
John R. Douceur, Jeremy Elson, Jon Howell, Jacob R...
GLOBECOM
2006
IEEE
15 years 7 months ago
Enhanced Per-Flow Admission Control and QoS Provisioning in IEEE 802.11e Wireless LANs
—The emerging IEEE 802.11e standard is expected to provide service differentiation and resource allocation for realtime traffic. To support the transmission of voice and multime...
Yi Liu, Chadi Assi, Anjali Agarwal