Sciweavers

2904 search results - page 206 / 581
» Internet Infrastructure Security
Sort
View
ICSE
2001
IEEE-ACM
15 years 8 months ago
Engineering Mobile-Agent Applications via Context-Dependent Coordination
: The design and development of Internet applications, requiring dynamic and possibly mobile access to Internet resources, can take advantage of an approach based on autonomous mob...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 4 months ago
Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication
Broadband communications consists of the technologies and equipment required to deliver packetbased digital voice, video, and data services to end users. Broadband affords end use...
S. S. Riaz Ahamed, D. Mahesh
133
Voted
SAC
2010
ACM
15 years 10 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
116
Voted
CCS
2009
ACM
15 years 10 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
FC
2009
Springer
142views Cryptology» more  FC 2009»
15 years 10 months ago
Passwords: If We're So Smart, Why Are We Still Using Them?
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...