Sciweavers

72 search results - page 13 / 15
» Teaching Network Security With IP Darkspace Data
Sort
View
118
Voted
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 10 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
124
Voted
IPPS
2005
IEEE
15 years 9 months ago
On the Impact of IPsec on Interactive Communications
Interactive communication services as telephony and video-conferences use the infrastructure of existing LANs and the Internet more and more. The advantages are obvious. For examp...
Jirka Klaue, Andreas Hess
133
Voted
MSWIM
2005
ACM
15 years 9 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
169
Voted
JOT
2008
136views more  JOT 2008»
15 years 3 months ago
The Stock Statistics Parser
This paper describes how use the HTMLEditorKit to perform web data mining on stock statistics for listed firms. Our focus is on making use of the web to get information about comp...
Douglas Lyon
ESORICS
2012
Springer
13 years 6 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...