Sciweavers

74 search results - page 14 / 15
» Secure IP Telephony using Multi-layered Protection
Sort
View
71
Voted
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
CN
2006
79views more  CN 2006»
14 years 9 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
WICOMM
2008
108views more  WICOMM 2008»
14 years 9 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CCS
2003
ACM
15 years 2 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...