Sciweavers

932 search results - page 177 / 187
» Design and Implementation of a Library of Network Protocols ...
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
WMASH
2003
ACM
14 years 1 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
ICDCS
1998
IEEE
14 years 20 days ago
NFS/M: An Open Platform Mobile File System
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile le system that can perform e ciently and correctly for accessing onlin...
John C. S. Lui, Oldfield K. Y. So, T. S. Tam
FAST
2010
13 years 10 months ago
Panache: A Parallel File System Cache for Global File Access
Cloud computing promises large-scale and seamless access to vast quantities of data across the globe. Applications will demand the reliability, consistency, and performance of a t...
Marc Eshel, Roger L. Haskin, Dean Hildebrand, Mano...
CASCON
1996
116views Education» more  CASCON 1996»
13 years 9 months ago
Measurements of DCE RPC performance in an OS/2 environment
Developing and managing applications for environments consisting of independently con gured computing systems interoperating acrossnetwork connections is of considerable interest ...
Ying Sun, Rick Bunt, Gregory M. Oster