Sciweavers

430 search results - page 22 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
AUTONOMICS
2008
ACM
13 years 10 months ago
R-P2P: a data centric DTN middleware with interconnected throwboxes
In this paper we describe R-P2P, a novel system meant to support the search and retrieval of data in a given area. RP2P couples opportunistic wireless communications between mobil...
Francesco De Pellegrini, Iacopo Carreras, Daniele ...
TMM
2010
152views Management» more  TMM 2010»
13 years 2 months ago
Network Awareness of P2P Live Streaming Applications: A Measurement Study
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
ICUMT
2009
13 years 5 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...