Sciweavers

1512 search results - page 239 / 303
» connection 2006
Sort
View
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
15 years 3 months ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ACSAC
2006
IEEE
15 years 3 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 3 months ago
Improving Web Performance through New Networking Technologies
New connection-oriented networking technologies can provide quality-of-service guaranteed network connectivity required by some web-based applications. In this paper, we present a...
Xiuduan Fang, Xuan Zheng, Malathi Veeraraghavan
AINTEC
2006
Springer
15 years 3 months ago
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks
AOMP (Ad-hoc Overlay Multicast Protocol) is a novel approach for application-layer multicast in ad-hoc networks. We introduce in this paper a new algorithm that exploits a few prop...
Mohamed Ali Kâafar, Cyrine Mrabet, Thierry T...
ALGOSENSORS
2006
Springer
15 years 3 months ago
Area Based Beaconless Reliable Broadcasting in Sensor Networks
: We consider the broadcasting problem in sensor networks where the nodes have no prior knowledge of their neighbourhood. We describe several Area-based Beaconless Broadcasting Alg...
Francisco Javier Ovalle-Martínez, Amiya Nay...