Sciweavers

2904 search results - page 155 / 581
» Internet Infrastructure Security
Sort
View
132
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Security Services in an Open Service Environment
Emerging telecommunication services use, store, or transmit sensitive personal data to form individual network services. We suggest an add-on approach to realize secure telecommun...
Reiner Sailer
132
Voted
ICCCN
1998
IEEE
15 years 8 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
123
Voted
CN
2000
76views more  CN 2000»
15 years 3 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
115
Voted
AINA
2005
IEEE
15 years 9 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito
109
Voted
COMCOM
2004
83views more  COMCOM 2004»
15 years 3 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li