Sciweavers

5488 search results - page 1046 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
127
Voted
CN
2004
122views more  CN 2004»
15 years 4 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
CACM
2000
158views more  CACM 2000»
15 years 4 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser
147
Voted
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 3 months ago
Detailed Network Measurements Using Sparse Graph Counters: The Theory
— Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that m...
Yi Lu, Andrea Montanari, Balaji Prabhakar
151
Voted
MONET
2002
142views more  MONET 2002»
15 years 3 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
155
Voted
NGC
1998
Springer
171views Communications» more  NGC 1998»
15 years 3 months ago
Programming Languages for Distributed Applications
Much progress has been made in distributed computing in the areas of distribution structure, open computing, fault tolerance, and security. Yet, writing distributed applications r...
Seif Haridi, Peter Van Roy, Per Brand, Christian S...
« Prev « First page 1046 / 1098 Last » Next »