Sciweavers

2904 search results - page 195 / 581
» Internet Infrastructure Security
Sort
View
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
15 years 9 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
USENIX
1994
15 years 5 months ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
133
Voted
WCE
2007
15 years 5 months ago
Beyond Web Intermediaries: A Framework for Securing Digital Content on Client Systems
—The move to begin to place liabilities for copyright violations on internet intermediaries such as ISPs and Cyber Cafes as a result of contents allowed through their networks is...
Stella C. Chiemeke, Olumide B. Longe
ESWS
2009
Springer
15 years 10 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
ACSAC
2005
IEEE
15 years 9 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...