Sciweavers

314 search results - page 30 / 63
» Secure Network Coding on a Wiretap Network
Sort
View
SRDS
2007
IEEE
14 years 1 months ago
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
Laurent Burgy, Laurent Réveillère, J...

Lecture Notes
773views
15 years 5 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
WORM
2004
13 years 9 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
ICUMT
2009
13 years 5 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
SOSP
2003
ACM
14 years 4 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...