Sciweavers

5324 search results - page 797 / 1065
» Internet Security Protocols
Sort
View
GLOBECOM
2010
IEEE
13 years 8 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
SECON
2010
IEEE
13 years 8 months ago
Using BGP in a Satellite-Based Challenged Network Environment
Once, satellites were considered an important option for creating global Internet access. However, for a period of time, satellites were supplanted by other ground-based technologi...
Roman Chertov, Kevin C. Almeroth
ICUMT
2009
13 years 8 months ago
A smart access point solution for heterogeneous flows
Abstract--Computer-centered services and broadband wireless connectivity are enabling the delivery of multimedia-based entertainment from the Internet to in-house wireless devices ...
Claudio E. Palazzi, Nicola Stievano, Marco Roccett...
CCR
2011
13 years 5 months ago
HTTP in the home: it is not just about PCs
HTTP (Hypertext Transport Protocol) was originally primarily used for human-initiated client-server communications launched from web browsers, traditional computers and laptops. H...
Jeffrey Erman, Alexandre Gerber, Subhabrata Sen
HOTNETS
2010
13 years 5 months ago
Packet re-cycling: eliminating packet losses due to network failures
This paper presents Packet Re-cycling (PR), a technique that takes advantage of cellular graph embeddings to reroute packets that would otherwise be dropped in case of link or nod...
Suksant Sae Lor, Raul Landa, Miguel Rio