Sciweavers

2207 search results - page 89 / 442
» Security at the Internet Layer
Sort
View
ICDCS
2007
IEEE
15 years 10 months ago
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
Application-layer overlay networks have recently emerged as a promising solution for live media multicast on the Internet. A tree is probably the most natural structure for a mult...
Feng Wang, Yongqiang Xiong, Jiangchuan Liu
INFOCOM
2007
IEEE
15 years 10 months ago
Cross-Layer Analysis of Rate Adaptation, DCF and TCP in Multi-Rate WLANs
—Wireless Internet access is facilitated by IEEE 802.11 WLANs that, in addition to realizing a specific form of CSMA/CA—distributed coordination function (DCF)— implement a ...
Jaehyuk Choi, Kihong Park, Chongkwon Kim
ICC
2007
IEEE
143views Communications» more  ICC 2007»
15 years 10 months ago
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ICEB
2004
297views Business» more  ICEB 2004»
15 years 5 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
149
Voted
ASIASIM
2004
Springer
15 years 9 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...