Sciweavers

629 search results - page 105 / 126
» Design of a Medium Access Control Protocol for Dynamic Spect...
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
NDSS
2000
IEEE
14 years 5 days ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
IMC
2004
ACM
14 years 1 months ago
Debugging DHCP performance
Dynamic Host Configuration Protocol (DHCP) was defined to facilitate automatic configuration of IP addresses and other network parameters to hosts in a network. Efficiency of D...
Vladimir Brik, Jesse Stroik, Suman Banerjee
TC
2008
13 years 7 months ago
Improving Quality of VoIP Streams over WiMax
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are ...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly