Sciweavers

7329 search results - page 43 / 1466
» Network Extractor Protocols
Sort
View
NDSS
1997
IEEE
14 years 2 months ago
Securing Distance-Vector Routing Protocols
Bradley R. Smith, Shree Murthy, J. J. Garcia-Luna-...
CORR
2010
Springer
103views Education» more  CORR 2010»
13 years 10 months ago
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many pot...
Siva Rama Krishnan Somayaji, Ch. A. S. Murty
COMSWARE
2007
IEEE
14 years 4 months ago
The Transport Layer Revisited
— End-to-end transport protocols such as TCP perform poorly in mobile environments, primarily due to their inability to cope with the dynamics incurred by node mobility. We re-co...
Simon Heimlicher, Rainer Baumann, Martin May, Bern...
ACSAC
2006
IEEE
14 years 2 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini