Sciweavers

124 search results - page 18 / 25
» An Analysis of the Degradation of Anonymous Protocols
Sort
View
ADHOCNOW
2008
Springer
14 years 1 months ago
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes
In this paper an innovative simulation study of five IEEE 802.11e network configurations is presented. The conducted analysis is crucial for understanding how a theoretically simpl...
Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
ICNS
2009
IEEE
14 years 2 months ago
Analysis and Experimental Evaluation of Data Plane Virtualization with Xen
Combining end-host, server and router virtualization could offer isolated and malleable virtual networks of different types, owners and protocols, all sharing one physical infrast...
Fabienne Anhalt, Pascale Vicat-Blanc Primet
INFOCOM
2010
IEEE
13 years 6 months ago
Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments
—In this paper, we consider routing in multi-hop wireless mesh networks. We analyze three standardized and commonly deployed routing mechanisms that we term “nodepair discovery...
Stanislav Miskovic, Edward W. Knightly
ESORICS
2003
Springer
14 years 21 days ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...