Sciweavers

2079 search results - page 190 / 416
» Quantifying Information Flow
Sort
View
ICC
2009
IEEE
159views Communications» more  ICC 2009»
14 years 4 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
INFOCOM
2009
IEEE
14 years 3 months ago
TCP/IP Timing Channels: Theory to Implementation
—There has been significant recent interest in covert communication using timing channels. In network timing channels, information is leaked by controlling the time between tran...
Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, N...
INFOCOM
2008
IEEE
14 years 3 months ago
Cyber-Fraud is One Typo Away
Abstract— Spelling errors when typing a URL can be exploited by website-squatters: users are led to phony sites in a phenomenon we call parasitic URL naming. These phony sites im...
Anirban Banerjee, Dhiman Barman, Michalis Faloutso...
NDSS
2008
IEEE
14 years 3 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
14 years 3 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin