• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 22,172
Next 10 →

Intercepting Mobile Communications: The Insecurity of 802.11

by Nikita Borisov, Ian Goldberg, David Wagner , 2001
"... The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives. T ..."
Abstract - Cited by 438 (2 self) - Add to MetaCart
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks. 1.

Router

by Santanu Sarma, N. Venkatasubramanian, A. Nicolau, P. Gupta
"... CPU $I $D CPU $L2 OCSA CPU $I $D CPU $L2 OCSA CPU ..."
Abstract - Add to MetaCart
CPU $I $D CPU $L2 OCSA CPU $I $D CPU $L2 OCSA CPU

Router

by Xiaodong Lin, Student Member, Xiaoting Sun, Xiaoyu Wang, Chenxi Zhang, Student Member, Pin-han Ho, Xuemin (sherman Shen, Senior Member, Change Lane
"... Abstract—In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of signature overhead and signature verification latency without compromising the security and privacy requirements. ..."
Abstract - Add to MetaCart
Abstract—In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of signature overhead and signature verification latency without compromising the security and privacy requirements. Compared with currently existing public key based packet authentication schemes for security and privacy, the communication and computation overhead of TSVC can be significantly reduced due to the short message authentication code (MAC) tag attached in each packet for the packet authentication, by which only a fast hash operation is required to verify each packet. Simulation results demonstrate that TSVC maintains acceptable packet latency with much less packet overhead, while significantly reducing the packet loss ratio compared with that of the existing public key infrastructure (PKI) based schemes, especially when the road traffic isheavy. Index Terms—Vehicular communications, security, TESLA, hash chain.

PARALLEL AND DISTRIBUTED SIMULATION SYSTEMS

by Richard M. Fujimoto , 2000
"... ..."
Abstract - Cited by 386 (22 self) - Add to MetaCart
Abstract not found

Internet Routing Instability

by Craig Labovitz, G. Robert Malan, Farnam Jahanian , 1997
"... This paper examines the network inter-domain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet routing instability, or the rapid fluctuation of network reachability information, is an important problem currently facing the In ..."
Abstract - Cited by 351 (9 self) - Add to MetaCart
several unexpected trends in routing instability, and examine a number of anomalies and pathologies observed in the exchange of inter-domain routing information. The analysis in this paper is based on data collected from BGP routing messages generated by border routers at five of the Internet core

Router Router Router

by David M. Schwenk, Joseph Bush, Lucie M. Hughes, Stephen Briggs, Will White, Lon Network , 2008
"... Vendor ..."
Abstract - Add to MetaCart
Abstract not found

Animated Pedagogical Agents: Face-to-Face Interaction in Interactive Learning Environments

by W. Lewis Johnson, Jeff W. Rickel, James C. Lester - INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION , 2000
"... Recent years have witnessed the birth of a new paradigm for learning environments: animated pedagogical agents. These lifelike autonomous characters cohabit learning environments with students to create rich, face-to-face learning interactions. This opens up exciting new possibilities; for example, ..."
Abstract - Cited by 362 (36 self) - Add to MetaCart
Recent years have witnessed the birth of a new paradigm for learning environments: animated pedagogical agents. These lifelike autonomous characters cohabit learning environments with students to create rich, face-to-face learning interactions. This opens up exciting new possibilities; for example, agents can demonstrate complex tasks, employ locomotion and gesture to focus students'attention on the most salient aspect of the task at hand, and convey emotional responses to the tutorial situation. Animated pedagogical agents offer great promise for broadening the bandwidth of tutorial communication and increasing learning environments' ability to engage and motivate students. This article sets forth the motivations behind animated pedagogical agents, describes the key capabilities they offer, and discusses the technical issues they raise. The discussion is illustrated with descriptions of a number of animated agents that represent the current state of the art.

RouteBricks: Exploiting Parallelism to Scale Software Routers

by Mihai Dobrescu, Norbert Egi, Katerina Argyraki, Byung-gon Chun, Kevin Fall, Gianluca Iannaccone, Allan Knies, Maziar Manesh, Sylvia Ratnasamy - In Proceedings of the 22nd ACM Symposium on Operating Systems Principles , 2009
"... We revisit the problem of scaling software routers, motivated by recent advances in server technology that enable highspeed parallel processing—a feature router workloads appear ideally suited to exploit. We propose a software router architecture that parallelizes router functionality both across mu ..."
Abstract - Cited by 166 (14 self) - Add to MetaCart
We revisit the problem of scaling software routers, motivated by recent advances in server technology that enable highspeed parallel processing—a feature router workloads appear ideally suited to exploit. We propose a software router architecture that parallelizes router functionality both across

A First-Principles Approach to Understanding the Internet's Router-level Topology

by Lun Li, David Alderson, Walter Willinger, John Doyle , 2004
"... A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved ..."
Abstract - Cited by 212 (19 self) - Add to MetaCart
and graph theory with a first-principles theory of router-level topology that reflects practical constraints and tradeoffs. While there is an inevitable tradeoff between model complexity and fidelity, a challenge is to distill from the seemingly endless list of potentially relevant technological

Vendor A Router Router Router

by Imcom Lonworks, Building Automation, David M. Schwenk, Joseph Bush, Lucie M. Hughes, Stephen Briggs, Will White, Lon Network
"... PC ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 11 - 20 of 22,172
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University