Sciweavers

2065 search results - page 410 / 413
» 10 Networking Papers: readings for protocol design
Sort
View
MM
2006
ACM
93views Multimedia» more  MM 2006»
14 years 1 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
ACSAC
2005
IEEE
14 years 29 days ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
DRM
2005
Springer
14 years 26 days ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
ICDCSW
2003
IEEE
14 years 19 days ago
Convergence of IPsec in Presence of Resets
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security ass...
Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
ISW
2007
Springer
14 years 1 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...