Sciweavers

666 search results - page 101 / 134
» Describing and simulating internet routes
Sort
View
TEI
2010
ACM
135views Hardware» more  TEI 2010»
14 years 2 months ago
Hands and fingers: a mobile platform for a person-centric network of computational objects
We describe a practical vision of ubiquitous computing with tangible interfaces, that orbits around an individual and is mediated by his or her personal consumer electronic device...
John Kestner, Henry Holtzman
WETICE
2008
IEEE
14 years 2 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
PAM
2007
Springer
14 years 1 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
SPW
2001
Springer
14 years 5 days ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
HICSS
2000
IEEE
109views Biometrics» more  HICSS 2000»
14 years 5 days ago
Scalable and Secure Resource Location
In this paper we present Captain Cook, a service that continuously monitors resources in the Internet, and allows clients to locate resources using this information. Captain Cook ...
Robbert van Renesse