Sciweavers

GLOBECOM
2008
IEEE
14 years 6 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
GLOBECOM
2008
IEEE
14 years 6 months ago
PeerGraph: A Distributed Data Structure for Peer-to-Peer Streaming
Video streaming over peer-to-peer networks has received significant attention recently. Accordingly, much work is done on video streaming under the assumption that all the peers ...
Ali Saman Tosun, Turgay Korkmaz
GLOBECOM
2008
IEEE
14 years 6 months ago
Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
Niklas Neumann, Xiaoming Fu
GLOBECOM
2008
IEEE
14 years 6 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
GLOBECOM
2008
IEEE
14 years 6 months ago
Secret Key Generation and Agreement in UWB Communication Channels
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communicatio...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
GLOBECOM
2008
IEEE
14 years 6 months ago
Using the ECN Nonce to Detect Spurious Loss Events in TCP
—A sudden delay spike or reordering in the network can cause TCP to experience a loss event. Since loss is interpreted as a sign of congestion in TCP, this causes the protocol to...
Michael Welzl
GLOBECOM
2008
IEEE
14 years 6 months ago
Understanding P2P-TV Systems Through Real Measurements
—In this paper, we consider two popular peer-to-peer TV (P2P-TV) systems: PPLive, one of the today most widely used P2P-TV systems, and Joost, a promising new generation applicat...
Delia Ciullo, Marco Mellia, Michela Meo, Emilio Le...
GLOBECOM
2008
IEEE
14 years 6 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
GLOBECOM
2008
IEEE
14 years 6 months ago
All-Optical Unicast/Multicast Routing in WDM Networks
Abstract—Optical Transport Networks (OTN) must be prepared in terms of better resource utilization, for accommodating unicast and multicast traffic together. Light-trees have be...
Javier E. Sierra, Luis F. Caro, Fernando Solano, J...