Export 32 results:
Filters: Keyword is Security [Clear All Filters]
Blockchain-enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things." IEEE Transactions on Industrial Informatics 16, no. 10 (2020): 6564-6574."
LEChain: A blockchain-based lawful evidence management scheme for digital forensics." Journal of Future Generation Computer Systems 115 (2020): 406-420."
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks." Computers and Security, Elsevier 94 (2020)."
Adding Explicit Congestion Notification (ECN) to TCP Control Packets. Internet Engineering Task Force, 2017.
Private Information Retrieval in Distributed Storage Systems Using an Arbitrary Linear Code In IEEE International Symposium on Information Theory (ISIT), Edited by G. Kramer and R. Mathar. IEEE, 2017.
More Accurate ECN Feedback in TCP. Internet Engineering Task Force, 2016.
The TCP Echo and TCP Echo Reply Options. Internet Engineering Task Force, 2015.
Byte and Packet Congestion Notification. RFC Editor, 2014.
Network Functions Virtualisation; Security; Problem Statement, Edited by B. Briscoe. ETSI NFV Industry Specification Group (ISG), 2014.
Re-ECN: A Framework for adding Congestion Accountability to TCP/IP. Internet Engineering Task Force, 2014.
Re-ECN: Adding Accountability for Causing Congestion to TCP/IP. Internet Engineering Task Force, 2014.
Management of hidden risks." IEEE Computer 46, no. 1 (2013): 65-70."
Open Research Issues in Internet Congestion Control, Edited by D. Papadimitriou. Internet Research Task Force, 2011.
Tunnelling of Explicit Congestion Notification. RFC Editor, 2010.
Policing Freedom to Use the Internet Resource Pool In Proc Workshop on Re-Architecting the Internet (ReArch’08). ACM, 2008.
Flow Rate Fairness: Dismantling a Religion." ACM SIGCOMM Computer Communication Review 37, no. 2 (2007): 63-74."
The Implications of Pervasive Computing on Network Design." In Intelligent Spaces, edited by A. Steventon and S. Wright. Vol. XVIII. Springer Verlag, 2006."
Using Self-Interest to Prevent Malice; Fixing the Denial of Service Flaw of the Internet In Proc Workshop on the Economics of Securing the Information Infrastructure., 2006.
Policing Congestion Response in an Internetwork Using Re-Feedback." Proc. ACM SIGCOMM'05, Computer Communication Review 35, no. 4 (2005): 277-288."
Shared Control of Networks Using Re-Feedback. BT, 2005.