Sciweavers

2562 search results - page 238 / 513
» An Internet without the Internet protocol
Sort
View
CCS
2009
ACM
15 years 9 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
DSN
2007
IEEE
15 years 8 months ago
Bounding Peer-to-Peer Upload Traffic in Client Networks
Peer-to-peer technique has now become one of the major techniques to exchange digital content between peers of the same interest. However, as the amount of peer-topeer traffic inc...
Chun-Ying Huang, Chin-Laung Lei
DIMVA
2010
15 years 5 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...
JSAC
2008
202views more  JSAC 2008»
15 years 4 months ago
Cognitive Wireless Mesh Networks with Dynamic Spectrum Access
Wireless Mesh Networks (WMNs) are envisaged to extend Internet access and other networking services in personal, local, campus, and metropolitan areas. Mesh routers (MR) form the c...
Kaushik R. Chowdhury, Ian F. Akyildiz
NETWORK
2008
119views more  NETWORK 2008»
15 years 4 months ago
Improving the Performance of Route Control Middleboxes in a Competitive Environment
Multihomed subscribers are increasingly adopting intelligent route control solutions to optimize the cost and end-to-end performance of the traffic routed among the different link...
Marcelo Yannuzzi, Xavier Masip-Bruin, Eva Mar&iacu...