Sciweavers

1697 search results - page 254 / 340
» Social-Networks Connect Services
Sort
View
ICC
2007
IEEE
199views Communications» more  ICC 2007»
14 years 4 months ago
7DS - Node Cooperation and Information Exchange in Mostly Disconnected Networks
— When the node density in a network decreases below the level necessary to sustain ad-hoc and mesh networks, communication can succeed only by leveraging node mobility and trans...
Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henn...
ICC
2007
IEEE
116views Communications» more  ICC 2007»
14 years 4 months ago
Fast Handover Scheme for Real-Time Applications in Mobile WiMAX
—Mobile WiMAX is one of the most promising technologies for broadband wireless communication. The IEEE 802.16e standard for Mobile WiMAX, the enhanced version of the IEEE 802.16 ...
Wenhua Jiao, Pin Jiang, Yuanyuan Ma
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICOIN
2007
Springer
14 years 4 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
PET
2007
Springer
14 years 4 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...