Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world
ACM Transactions on Internet Technology (TOIT)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
High-Performance Memory-Based Web Servers: Kernel and User-Space Performance
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
A Quantum Key Distribution Network through Single Mode Optical Fiber
CTS '06 Proceedings of the International Symposium on Collaborative Technologies and Systems
Evaluating information assurance strategies
Decision Support Systems
UDT: UDP-based data transfer for high-speed wide area networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
ICFN '10 Proceedings of the 2010 Second International Conference on Future Networks
SECURWARE '10 Proceedings of the 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
Analysis of the HIP base exchange protocol
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
GRID computing infrastructures and applications coordinate uncontrolled and decentralised resources; using new fast data transfer protocols deliver and provide high data transmission that can meet high performance computing requirements of users, institutions, and industries. For such environments standard transport protocols such as TCP and UDP are not always sufficient given their fixed set of properties and limited flexibility. We analyse a new high-speed UDT (UDP-Data Transfer), a protocol considered to have addressed the limitation issues of TCP and UDP. However, this protocol was designed without a well-thought-out security. We surveyed and conducted experiments on existing security mechanisms to determine their viability to secure UDT. The results of the experiments provide important dimensions to our aim of developing comprehensive security architecture for UDT in the future.