Sciweavers

1030 search results - page 32 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
JMLR
2006
113views more  JMLR 2006»
14 years 9 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
GLOBECOM
2007
IEEE
15 years 4 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
91
Voted
ICRA
1994
IEEE
154views Robotics» more  ICRA 1994»
15 years 1 months ago
The Network Data Delivery Service: Real-Time Data Connectivity for Distributed Control Applications
The Network Data Delivery Service NDDS is a novel network data-sharing system. NDDS builds on the model of information producers sources and consumers sinks. Producers generate da...
Gerardo Pardo-Castellote, Stanley A. Schneider
WONS
2005
IEEE
15 years 3 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
CCR
1998
75views more  CCR 1998»
14 years 9 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast