Sciweavers

5324 search results - page 757 / 1065
» Internet Security Protocols
Sort
View
CCR
2008
75views more  CCR 2008»
13 years 11 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
CN
2007
88views more  CN 2007»
13 years 11 months ago
DMTP: Controlling spam through message delivery differentiation
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
IMC
2010
ACM
13 years 9 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
ICC
2009
IEEE
13 years 8 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
CCS
2009
ACM
14 years 11 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong