Sciweavers

2207 search results - page 84 / 442
» Security at the Internet Layer
Sort
View
CCR
2004
79views more  CCR 2004»
15 years 4 months ago
Preventing Internet denial-of-service with capabilities
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) attacks. Instead of being able to send anything to anyone at any time, in our archi...
Thomas E. Anderson, Timothy Roscoe, David Wetheral...
PIMRC
2008
IEEE
15 years 10 months ago
A hybrid P2P/Infrastructure platform for personal and social Internet services
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
Dimitris N. Kalofonos, Zoe Antoniou
CORR
2010
Springer
153views Education» more  CORR 2010»
15 years 4 months ago
Adaptation of TURN protocol to SIP protocol
Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-
Mustapha Guezouri, Ahmed Blaha, Mokhtar Keche
HPDC
1999
IEEE
15 years 8 months ago
CAT: A High Performance Distributed Component Architecture Toolkit for the Grid
Grid systems such as Globus, Legion, and Globe provide an infrastructure for implementing metacomputing over the Internet. The Component Architecture Toolkit (CAT) provides a soft...
Juan E. Villacis, Madhusudhan Govindaraju, David S...
131
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Characterizing physical-layer secrecy with unknown eavesdropper locations and channels
—We present a probabilistic framework for physical layer secrecy when the locations and channels of the eavesdroppers are unknown. The locations are modeled by a Poisson point pr...
Mounir Ghogho, Ananthram Swami