Efficient authentication and signing of multicast streams over lossy channels

A Perrig, R Canetti, JD Tygar… - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
Multicast stream authentication and signing is an important and challenging problem.
Applications include the continuous authentication of radio and TV Internet broadcasts, and …

Modeling TCP Reno performance: a simple model and its empirical validation

J Padhye, V Firoiu, DF Towsley… - IEEE/ACM transactions …, 2000 - ieeexplore.ieee.org
The steady-state performance of a bulk transfer TCP flow (ie, a flow with a large amount of
data to send, such as FTP transfers) may be characterized by the send rate, which is the …

Modeling TCP latency

N Cardwell, S Savage… - … IEEE INFOCOM 2000 …, 2000 - ieeexplore.ieee.org
Several analytic models describe the steady-state throughput of bulk transfer TCP flows as a
function of round trip time and packet loss rate. These models describe flows based on the …

A taxonomy of multicast data origin authentication: Issues and solutions

Y Challal, H Bettahar… - … Surveys & Tutorials, 2004 - ieeexplore.ieee.org
Multicasting is an efficient communication mechanism for group-oriented applications such
as videoconferencing, broadcasting stock quotes, interactive group games, and video on …

The Gilbert-Elliott model for packet loss in real time services on the Internet

G Haßlinger, O Hohlfeld - 14th GI/ITG Conference …, 2008 - ieeexplore.ieee.org
The estimation of quality for real-time services over telecommunication networks requires
realistic models for impairments and failures during transmission. We focus on the classical …

Wireless control for smart manufacturing: Recent approaches and open challenges

D Baumann, F Mager, U Wetzker, L Thiele… - Proceedings of the …, 2020 - ieeexplore.ieee.org
Smart manufacturing aims to overcome the limitations of today's rigid assembly lines by
making the material flow and manufacturing process more flexible, versatile, and scalable …

On the constancy of Internet path properties

Y Zhang, N Duffield - Proceedings of the 1st ACM SIGCOMM Workshop …, 2001 - dl.acm.org
Many Internet protocols and operational procedures use measurements to guide future
actions. This is an effective strategy if the quantities being measured exhibit a degree of …

High-performance and energy-efficient mobile web browsing on big/little systems

Y Zhu, VJ Reddi - 2013 IEEE 19th International Symposium on …, 2013 - ieeexplore.ieee.org
Internet web browsing has reached a critical tipping point. Increasingly, users rely more on
mobile web browsers to access the Internet than desktop browsers. Meanwhile, webpages …

[图书][B] Speech quality of VoIP: assessment and prediction

A Raake - 2007 - books.google.com
Finally a comprehensive overview of speech quality in VoIP from the user's perspective!
Speech Quality of VoIP is an essential guide to assessing the speech quality of VoIP …

ELK, a new protocol for efficient large-group key distribution

A Penrig, D Song, D Tygar - … on Security and Privacy. S&P 2001, 2000 - ieeexplore.ieee.org
Secure media broadcast over the Internet poses unique security challenges. One problem is
access control to a large number of subscribers in a public broadcast. A common solution is …