Sciweavers

3031 search results - page 150 / 607
» Reuse in the application layer
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
15 years 10 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
CODES
2005
IEEE
15 years 9 months ago
Enabling unrestricted automated synthesis of portable hardware accelerators for virtual machines
The performance of virtual machines (e.g., Java Virtual Machines—JVMs) can be significantly improved when critical code sections (e.g., Java bytecode methods) are migrated from...
Miljan Vuletic, Christophe Dubach, Laura Pozzi, Pa...
FC
2005
Springer
133views Cryptology» more  FC 2005»
15 years 9 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
CISSE
2008
Springer
15 years 6 months ago
Features Based Approach to Identify the P2P File Sharing
With the improvement of computer network and the growth of bandwidth, the types of Internet traffic have been changed. The P2P file sharing application became the significant sour...
Jian-Bo Chen
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 4 months ago
Adaptation of TURN protocol to SIP protocol
Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-
Mustapha Guezouri, Ahmed Blaha, Mokhtar Keche