Sciweavers

2207 search results - page 169 / 442
» Security at the Internet Layer
Sort
View
IEEESP
2006
130views more  IEEESP 2006»
15 years 4 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
138
Voted
CSFW
2007
IEEE
15 years 11 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
CONEXT
2008
ACM
15 years 6 months ago
Towards a new generation of information-oriented internetworking architectures
In response to the limitations of the Internet architecture when used for applications for which it was not originally designed, a series of clean slate efforts have emerged to sh...
Christian Esteve, Fábio Luciano Verdi, Maur...
IMC
2007
ACM
15 years 6 months ago
Inferring subnets in router-level topology collection studies
Internet measurement studies require availability of representative topology maps. Depending on the map resolution (e.g., autonomous system level or router level), the procedure o...
Mehmet Hadi Gunes, Kamil Saraç
SIGOPS
2008
116views more  SIGOPS 2008»
15 years 4 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra