Sciweavers

359 search results - page 27 / 72
» comcom 2008
Sort
View
COMCOM
2006
75views more  COMCOM 2006»
14 years 9 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
72
Voted
COMCOM
2006
121views more  COMCOM 2006»
14 years 9 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
COMCOM
2006
103views more  COMCOM 2006»
14 years 9 months ago
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Today's public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their serv...
Attila Weyland, Thomas Staub, Torsten Braun
COMCOM
2006
118views more  COMCOM 2006»
14 years 9 months ago
A novel content-aware interleaving for wireless video transmission
In wireless network environments, the effect of transmission errors and losses on the video quality vary, depending on the intensity of the burst, and which parts of the video str...
Jeong-Yong Choi, Jitae Shin
COMCOM
2006
115views more  COMCOM 2006»
14 years 9 months ago
Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance
There exists a high demand for reliable, high capacity underwater acoustic networks to allow efficient data gathering and information exchange. This is evidenced by significant re...
Mihaela Cardei