Sciweavers

290 search results - page 22 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
ICCCN
1998
IEEE
15 years 4 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
IPPS
2002
IEEE
15 years 4 months ago
On Reliable and Scalable Peer-to-Peer Web Document Sharing
We propose a peer-to-peer Web document sharing technique, called “Browsers-Aware Proxy Server”. In this design, a proxy server connecting to a group of networked clients maint...
Li Xiao, Xiaodong Zhang, Zhichen Xu
JNSM
2010
110views more  JNSM 2010»
14 years 6 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
GLOBECOM
2010
IEEE
14 years 9 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
GLOBECOM
2008
IEEE
15 years 26 days ago
Perturbation-Based Distributed Beamforming for Wireless Relay Networks
—This paper deals with distributed beamforming techniques for wireless networks with half-duplex amplify-andforward relays. Existing schemes optimize the beamforming weights base...
Peter Fertl, Ari Hottinen, Gerald Matz