Sciweavers

450 search results - page 82 / 90
» Reliable Communication over Partially Authenticated Networks
Sort
View
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 2 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
SIGCOMM
2005
ACM
14 years 1 months ago
OpenDHT: a public DHT service and its uses
Large-scale distributed systems are hard to deploy, and distributed hash tables (DHTs) are no exception. To lower the barriers facing DHT-based applications, we have created a pub...
Sean C. Rhea, Brighten Godfrey, Brad Karp, John Ku...
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
14 years 2 months ago
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents
— Digital fountain codes are becoming increasingly important for multimedia communications over networks subject to packet erasures. These codes have significantly lower complex...
Mattia C. O. Bogino, Pasquale Cataldi, Marco Grang...
BROADNETS
2004
IEEE
13 years 11 months ago
Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks
Survivability becomes increasingly critical in managing high-speed networks as data traffic continues to grow in both size and importance. In addition, the impact of failures is e...
Sun-il Kim, Steven S. Lumetta
JSAC
2010
214views more  JSAC 2010»
13 years 6 months ago
IEEE 802.15.5 WPAN mesh standard-low rate part: Meshing the wireless sensor networks
—This paper introduces a new IEEE standard, IEEE 802.15.5,which provides mesh capability for wireless personal area network (WPAN) devices. The standard provides an architectural...
Myung J. Lee, Rui Zhang, Jianliang Zheng, Gahng-Se...