Sciweavers

2904 search results - page 118 / 581
» Internet Infrastructure Security
Sort
View
AIMS
2011
Springer
14 years 5 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
LCN
1999
IEEE
15 years 5 months ago
An Architecture for Managing QoS-Enabled VPNs over the Internet
This paper describes an architecture for the management of QoS-enabled virtual private networks (VPNs) over the Internet. The architecture focuses on two important issues of VPNs:...
Manuel Günter, Torsten Braun, Ibrahim Khalil
CORR
1999
Springer
70views Education» more  CORR 1999»
15 years 1 months ago
Restart Strategies and Internet Congestion
We recently presented a methodology to quantitatively reduce the average time and variance in the time required to execute electronic transactions in a network environment such as...
Sebastian M. Maurer, Bernardo A. Huberman
SWS
2004
ACM
15 years 7 months ago
Secure sessions for web services
Karthikeyan Bhargavan, Ricardo Corin, Cédri...
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 7 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna