Sciweavers

7741 search results - page 67 / 1549
» Security in Active Networks
Sort
View
PERCOM
2005
ACM
14 years 3 months ago
Applying Active Space Principles to Active Classrooms
Recent developments in pervasive computing have enabled new features for collaboration and instrumentation in educational technology systems. An infrastructure for the integration...
Chad Peiper, David Warden, Ellick Chan, Roy H. Cam...
DSOM
1999
Springer
14 years 2 months ago
Virtual Active Networks - Safe and Flexible Environments for Customer-managed Services
Recent research has demonstrated the benefits of active networks: customized network services can easily be built and modified, packet streams can be processed inside the network...
Marcus Brunner, Rolf Stadler
IMC
2006
ACM
14 years 4 months ago
Comprehensive view of a live network coding P2P system
In this paper we present the first implementation of a P2P content distribution system that uses Network Coding. Using results from live trials with several hundred nodes, we pro...
Christos Gkantsidis, John Miller, Pablo Rodriguez
ESORICS
2007
Springer
14 years 4 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
IWSEC
2009
Springer
14 years 4 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto