Sciweavers

241 search results - page 15 / 49
» Using Conservation of Flow as a Security Mechanism in Networ...
Sort
View
CCR
2002
113views more  CCR 2002»
13 years 8 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
ICC
2008
IEEE
151views Communications» more  ICC 2008»
14 years 2 months ago
Hop-by-Hop Local Flow Control over InterPlaNetary Networks Based on DTN Architecture
—Deep space communications are an important research line in scientific community. The possibility of performing the communication between earth and other planets is an excitant ...
Floriano De Rango, Mauro Tropea, Giovanni Battista...
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
SPW
2005
Springer
14 years 1 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
IWAN
2000
Springer
14 years 1 days ago
Performance of Active Multicast Congestion Control
This paper aims to provide insight into the behavior of congestion control mechanisms for reliable multicast protocols. A multicast congestion control based on active networks has ...
Marifeli Sedano, Arturo Azcorra, María Cald...