Sciweavers

5324 search results - page 782 / 1065
» Internet Security Protocols
Sort
View
SPW
2000
Springer
14 years 2 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
CCS
2008
ACM
14 years 27 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
WWW
2006
ACM
14 years 11 months ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer
SIGCOMM
2009
ACM
14 years 5 months ago
Why should we integrate services, servers, and networking in a data center?
Since the early days of networks, a basic principle has been that endpoints treat the network as a black box. An endpoint injects a packet with a destination address and the netwo...
Paolo Costa, Thomas Zahn, Antony I. T. Rowstron, G...
CONEXT
2006
ACM
14 years 4 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai