Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
We present an approach to building multicast services at the network layer using unicast forwarding and two additional building blocks: (i) ephemeral state probes, i.e. extremely l...
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
Abstract-Dynamic routing protocols such as RIP and OSPF essentially implement distributed algorithms for solving the Shortest Paths Problem. The Border Gateway Protocol (BGP) is cu...
Timothy Griffin, F. Bruce Shepherd, Gordon T. Wilf...