Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
In this paper we experimentally investigate if optimal retry times can be determined based on models that assume independence of successive tries. We do this using data obtained fo...
Philipp Reinecke, Aad P. A. van Moorsel, Katinka W...
This paper describes a model for generating time series which exhibit the statistical phenomenon known as long-range dependence (LRD). A Markov Modulated Process based upon an inf...
—Internet Service Providers (ISPs) have failed to reduce the cost of peer-to-peer (P2P) traffic. Traffic throttling devices increase user download times, and caches store content...
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...