Sciweavers

121 search results - page 22 / 25
» Network externalities and the deployment of security feature...
Sort
View
ACSAC
2000
IEEE
14 years 2 days ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
JSAC
2010
131views more  JSAC 2010»
13 years 6 months ago
BGP Add-Paths: The Scaling/Performance Tradeoffs
— Internet Service Providers design their network with resiliency in mind, having multiple paths towards external IP subnets available at the borders of their network. However, w...
Virginie Van den Schrieck, Pierre François,...
USS
2010
13 years 5 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
GLOBECOM
2007
IEEE
13 years 9 months ago
Route Optimization for Large Scale Network Mobility Assisted by BGP
—This paper presents a novel scheme that enables IPv6 mobile networks to perform optimal route optimization. The proposed scheme exploits features of the widely deployed border g...
Feriel Mimoune, Farid Naït-Abdesselam, Tarik ...
USS
2004
13 years 9 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson