Sciweavers

259 search results - page 18 / 52
» ccr 2008
Sort
View
CCR
2004
164views more  CCR 2004»
13 years 9 months ago
A taxonomy of DDoS attack and DDoS defense mechanisms
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents tw...
Jelena Mirkovic, Peter L. Reiher
CCR
2004
79views more  CCR 2004»
13 years 9 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
CCR
2000
93views more  CCR 2000»
13 years 9 months ago
On the validity of digital signatures
An important feature of digital signatures is to serve as nonrepudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should...
Jianying Zhou, Robert H. Deng
CCR
2000
94views more  CCR 2000»
13 years 9 months ago
An application developer's perspective on reliable multicast for distributed interactive media
In this paper we investigate which characteristics reliable multicast services should have in order to be appropriate for use by distributed interactive media applications such as...
Martin Mauve, Volker Hilt
CCR
2000
78views more  CCR 2000»
13 years 9 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas