Sciweavers

2904 search results - page 128 / 581
» Internet Infrastructure Security
Sort
View
ACSAC
2000
IEEE
15 years 6 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
CMS
2001
119views Communications» more  CMS 2001»
15 years 2 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
PAM
2009
Springer
15 years 8 months ago
Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts
Estimate of packet-loss rates between arbitrary Internet hosts is critical for many large-scale distributed applications, including overlay routing, P2P media streaming, VoIP, and ...
Angela Wang, Cheng Huang, Jin Li, Keith W. Ross
IADIS
2004
15 years 2 months ago
Internet diffusion in the non profit sector in Italy
This paper analyzes Internet diffusion among organizations, based on daily observation of the registration of second level domain names under the ".it" ccTLD. In particu...
Maurizio Martinelli, Irma Serrecchia, Michela Serr...
AIPT
1993
15 years 2 months ago
Automating the OSI to Internet Management Conversion Through the Use of an Object-Oriented Platform
OSI provides a powerful object-oriented management model that is infinitely scalable and extensible but is only now beginning to see widespread support. The Internet model has fo...
George Pavlou, Saleem N. Bhatti, Graham Knight