Sciweavers

899 search results - page 11 / 180
» On Wiretap Networks II
Sort
View
CCS
2009
ACM
14 years 8 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 4 months ago
Constructions of Optical Queues With a Limited Number of Recirculations--Part II: Optimal Constructions
One of the main problems in all-optical packet-switched networks is the lack of optical buffers, and one feasible technology for the constructions of optical buffers is to use opt...
Xuan-Chao Huang, Jay Cheng

Lecture Notes
456views
15 years 5 months ago
Wireless and Mobile Networking
The lecture notes cover the following topics, CSE 574S Wireless and Mobile Networking: Course Overview, Wireless Networking Trends, A Review of Key Wireless Physical Layer Co...
Raj Jain
CMS
2010
149views Communications» more  CMS 2010»
13 years 7 months ago
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks
Abstract. Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible...
Ge Zhang, Simone Fischer-Hübner
JITECH
2010
116views more  JITECH 2010»
13 years 6 months ago
Design theory for dynamic complexity in information infrastructures: the case of building internet
We propose a design theory that tackles dynamic complexity in the design for Information Infrastructures (IIs) defined as a shared, open, heterogeneous and evolving socio-technica...
Ole Hanseth, Kalle Lyytinen