Sciweavers

2207 search results - page 119 / 442
» Security at the Internet Layer
Sort
View
CN
1999
154views more  CN 1999»
15 years 4 months ago
Architectural Considerations in the Design of WDM-Based Optical Access Networks
We describe a WDM-based optical access network architecture for providing broadband Internet services. The architecture uses a passive collection and distribution network and a co...
Eytan Modiano, Richard A. Barry
ICC
2007
IEEE
15 years 10 months ago
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment
— A novel client puzzle protocol, the Memoryless Puzzle Protocol (MPP), is proposed and investigated. The goal is to show that MPP is a viable solution for mitigating distributed...
Nicholas A. Fraser, Douglas J. Kelly, Richard A. R...
IWAN
1999
Springer
15 years 8 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...
COMCOM
2007
104views more  COMCOM 2007»
15 years 4 months ago
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
: Wireless sensor networks are an emerging technology for low-cost, unattended monitoring of a wide range of environments, and their importance has been enforced by the recent deli...
Paolo Baronti, Prashant Pillai, Vince W. C. Chook,...
IEEEARES
2007
IEEE
15 years 10 months ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell