Sciweavers

NDSS
1999
IEEE
14 years 3 months ago
Why Do We Need More Research?
Steven M. Bellovin
NDSS
1999
IEEE
14 years 3 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
NDSS
1999
IEEE
14 years 3 months ago
An Algebra for Assessing Trust in Certification Chains
Open networks allow users to communicate without any prior arrangements such as contractual agreement or organisation membership. However, the very nature of open networks makes a...
Audun Jøsang
NDSS
1999
IEEE
14 years 3 months ago
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Anonymity of ballots in electronic voting schemes usually relies on the existence of some kind of anonymous channel between voters and ballot collecting authorities. Currently, th...
Andreu Riera, Joan Borrell
LCN
1999
IEEE
14 years 3 months ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra
LCN
1999
IEEE
14 years 3 months ago
AQuaFWiN: Adaptive QoS Framework for Multimedia in Wireless Networks and Its Comparison with other QoS Frameworks
In a wireless environment, due to topology changes and characteristics of media (interference in radio signals) the bandwidth of a link is unpredictable and possibly very low, the...
Bobby Vandalore, Raj Jain, Sonia Fahmy, Sudhir S. ...
LCN
1999
IEEE
14 years 3 months ago
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with mini...
Khaled Salah, Elias Drakopoulos, Tzilla Elrad
LCN
1999
IEEE
14 years 3 months ago
Packet Level Performance Characteristics of a MAC Protocol for Wireless ATM LANs
This paper determines packet level performance measures of a MAC protocol for a wireless ATM local area network. A key characteristic of the MAC protocol is the Identi er Splittin...
Benny Van Houdt, Chris Blondia, Olga Casals, Jorge...
LCN
1999
IEEE
14 years 3 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
LCN
1999
IEEE
14 years 3 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix