Search

Showing total 9,878 results

Search Constraints

Start Over You searched for: Topic computer network Remove constraint Topic: computer network Language undetermined Remove constraint Language: undetermined Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
9,878 results

Search Results

1. Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)

2. An Analysis of Longitudinal TCP Passive Measurements (Short Paper)

3. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)

4. An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)

5. Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX (Short Paper)

6. Timing Attacks on PIN Input in VoIP Networks (Short Paper)

7. Cooperative Spectrum Sensing in Ad-Hoc Networks (Invited Paper)

8. Evaluation of a QoS-Aware Protocol with Adaptive Feedback Scheme for Mobile Ad Hoc Networks (Short Paper)

9. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)

10. Best Paper: Stabilizing Clock Synchronization for Wireless Sensor Networks

11. Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)

12. Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper)

13. Manycast Service in Optical Burst/Packet Switched (OBS/OPS) Networks (Invited Paper)

14. TCP-Peach++: Enhancement of TCP-Peach+ for Satellite IP Networks with Asymmetrical Bandwidth and Persistent Fades—(Invited Paper)

15. IP Traffic Load Distribution in NGEO Broadband Satellite Networks – (Invited Paper)

16. QoS-Predictions Service: Infrastructural Support for Proactive QoS- and Context-Aware Mobile Services (Position Paper)

17. Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper)

18. Dynamics and Convergence of Resource Prices in Market-Oriented Overlay Networks

19. Throughput Potential of Overlay Cognitive Wireless Mesh Networks

20. Interfacing Living Cells via Molecular Communication

21. Never Trust a Bunny

22. Cross-Layer Deanonymization Methods in the Lightning Protocol

23. Reliability of Cooperative Vehicular Applications on Real Scenarios Over an IEEE 802.11p Communications Architecture

24. Encryption Schemes Secure Against Profiling Adversaries

25. An Ambient ASM Model of Client-to-Client Interaction via Cloud Computing and an Anonymously Accessible Docking Service

26. Software Authentication to Enhance Trust in Body Sensor Networks

27. Stability and Performance of Wireless Sensor Networks during the Tracking of Dynamic Targets

28. Spoofed ARP Packets Detection in Switched LAN Networks

29. Use of AGPS Call Data Records for Non-GPS Terminal Positioning in Cellular Networks

30. Cooperative Intrusion Detection Model Based on State Transition Analysis

31. A Dynamic Scalable Video Conference System Based on SIP

32. A Comparison of Current Web Protocols for Usage in Cloud based Automation Systems

33. State of the Art and Future Applications of Industrial Wireless Sensor Networks

34. Implementation of the New Integration Model of Security and QoS for MANET to the OPNET

35. RUDP Design and Implementation Using OPNET Simulation

36. Key Factors for a Proper Available-Bandwidth-Based Flow Admission Control in Ad-Hoc Wireless Sensor Networks

37. Research on Tracking Mobile Targets Based on Wireless Video Sensor Networks

38. A Security Protocol based-on Mutual Authentication Application toward Wireless Sensor Network

39. Guiding Users to Shops Using the Near-Field Communication between Signages and Mobile Terminals

40. Improved Cryptanalysis of the DECT Standard Cipher

41. A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks

42. Sybil-Resist: A New Protocol for Sybil Attack Defense in Social Network

43. Large-Scale Traffic Anomaly Detection: Analysis of Real Netflow Datasets

44. Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery

45. Assessment of Multimedia Services QoS/QoE over LTE Networks

46. A Study of RPL DODAG Version Attacks

47. Decision Engine Based Access Router Discovery Scheme in IEEE 802.11

48. Obligation Based Access Control

49. Power Control Research Based on Interference Coordination for D2D Underlaying Cellular Networks

50. Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things