Sciweavers

3349 search results - page 193 / 670
» Data Security
Sort
View
115
Voted
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 8 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
15 years 7 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
NETWORKING
2004
15 years 5 months ago
Secure Reverse Communication in a Multicast Tree
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...
Josep Domingo-Ferrer, Antoni Martínez-Balle...
ISICT
2003
15 years 5 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 4 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania