Sciweavers

5324 search results - page 212 / 1065
» Internet Security Protocols
Sort
View
CCS
2008
ACM
15 years 6 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
15 years 10 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
DSS
2006
170views more  DSS 2006»
15 years 4 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
ISCC
2008
IEEE
110views Communications» more  ISCC 2008»
15 years 11 months ago
Performance testing of Mobile IPv6 protocol
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin,...
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 4 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin