Sciweavers

382 search results - page 73 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
JSAC
2011
115views more  JSAC 2011»
13 years 2 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
WWW
2001
ACM
14 years 8 months ago
N for the price of 1: bundling web objects for more efficient content delivery
: Persistent connections address inefficiencies associated with multiple concurrent connections. They can improve response time when successfully used with pipelining to retrieve a...
Craig E. Wills, Mikhail Mikhailov, Hao Shang
PADS
2003
ACM
14 years 21 days ago
HLA-based Adaptive Distributed Simulation of Wireless Mobile Systems
Wireless networks’ models differ from wired ones at least in the innovative dynamic effects of host-mobility and open-broadcast nature of the wireless medium. Topology changes d...
Luciano Bononi, Gabriele D'Angelo, Lorenzo Donatie...
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu