Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Network traffic measurements can provide essential data for network research and operation. While Internet traffic has been heavily studied for several years, there are new charact...
New approaches in the Web environment are underway. These new methodologies try to leverage it from an information medium to a knowledgeable level, from a machine point of view. Th...