Sciweavers

121 search results - page 6 / 25
» Network externalities and the deployment of security feature...
Sort
View
ICNP
2007
IEEE
14 years 2 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
USITS
2003
13 years 9 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
TCSV
2008
298views more  TCSV 2008»
13 years 7 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...
WWW
2004
ACM
14 years 8 months ago
Pride: peer-to-peer reputation infrastructure for decentralized environments
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In the absence of any common goals shared by the nodes ...
Prashant Dewan, Partha Dasgupta
HOTNETS
2010
13 years 2 months ago
HTTP as the narrow waist of the future internet
Over the past decade a variety of network architectures have been proposed to address IP's limitations in terms of flexible forwarding, security, and data distribution. Meanw...
Lucian Popa 0002, Ali Ghodsi, Ion Stoica