Sciweavers

2259 search results - page 395 / 452
» internet 2007
Sort
View
PAM
2007
Springer
15 years 6 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
PAM
2007
Springer
15 years 6 months ago
Investigating the Imprecision of IP Block-Based Geolocation
The lack of adoption of a DNS-based geographic location service as proposed in RFC 1876 has lead to the deployment of alternative ways to locate Internet hosts. The two main altern...
Bamba Gueye, Steve Uhlig, Serge Fdida
PCM
2007
Springer
112views Multimedia» more  PCM 2007»
15 years 6 months ago
Efficient Segment Based Streaming Media Transcoding Proxy for Various Types of Mobile Devices
Streaming media has contributed to a significant amount of today’s Internet Traffic. One solution of to solve this problems is using streaming proxy. There are two categories in ...
Yoohyun Park, Yong-Ju Lee, Hag-Young Kim, Kyongsok...
PET
2007
Springer
15 years 6 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
RAID
2007
Springer
15 years 6 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...