Sciweavers

2207 search results - page 69 / 442
» Security at the Internet Layer
Sort
View
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 10 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
144
Voted
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
15 years 10 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
139
Voted
EUROMICRO
2007
IEEE
15 years 10 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
WETICE
2007
IEEE
15 years 10 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
WEBI
2009
Springer
15 years 10 months ago
Building Blocks: Layered Components Approach for Accumulating High-Demand Web Services
Abstract—Customization of systems is costly, but it is necessary to better meet the needs of multi-various tasks and requirements in the fields such as medical care, education, ...
Satoshi Morimoto, Satoshi Sakai, Masaki Gotou, Hee...