Sciweavers

1208 search results - page 205 / 242
» Channel abstractions for network security
Sort
View
PUC
2000
94views more  PUC 2000»
14 years 9 months ago
Places to Stay on the Move: Software Architectures for Mobile User Interfaces
abstract Alan Dix Devina Ramduny Tom Rodden, Nigel Davies. aQtive limited and Staffordshire University Staffordshire University Lancaster University http://www.hiraeth.com/alan/top...
Alan J. Dix, Devina Ramduny, Tom Rodden, Nigel Dav...
77
Voted
IPOM
2009
Springer
15 years 4 months ago
A Feasibility Evaluation on Name-Based Routing
Abstract. The IPv4 addressing scheme has been the standard for Internet communication since it was established in the 1960s. However, the enormous increase in Internet traffic usag...
Haesung Hwang, Shingo Ata, Masayuki Murata
76
Voted
IDEAL
2005
Springer
15 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 4 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
PET
2009
Springer
15 years 4 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux