Sciweavers

81 search results - page 15 / 17
» Authenticating real time packet streams and multicasts
Sort
View
ISCC
2008
IEEE
122views Communications» more  ISCC 2008»
14 years 1 months ago
A flexible network monitoring tool based on a data stream management system
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper describes a flexible network monitoring tool, called Pa...
Natascha Petry Ligocki, Carmem S. Hara, Christiano...
PIMRC
2008
IEEE
14 years 1 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...
PET
2005
Springer
14 years 1 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
ICNP
1998
IEEE
13 years 11 months ago
Signaling for Internet Telephony
Internet telephony must offer the standard telephony services. However, the transition to Internetbased telephony services also provides an opportunity to create new services more...
Henning Schulzrinne, Jonathan D. Rosenberg
CN
1999
69views more  CN 1999»
13 years 7 months ago
Transport of video over partial order connections
A Partial Order and partial reliable Connection (POC) is an end-to-end transport connection authorized to deliver objects in an order that can differ from the transmitted one. Such...
Luis Rojas-Cardenas, Emmanuel Chaput, Laurent Dair...