Sciweavers

1123 search results - page 133 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
WISTP
2007
Springer
15 years 10 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
EDOC
2006
IEEE
15 years 10 months ago
Services and Networks management through embedded devices and SOA
In this paper we present an embedded device able to manage the remote boot of network nodes by means of Wake on LAN (WoL) through Internet and Wide Area Network, presenting it as ...
Virgilio Gilart-Iglesias, Francisco Maciá P...
ICAC
2007
IEEE
15 years 10 months ago
Autonomic Reactive Systems via Online Learning
— Reactive systems are those that maintain an ongoing interaction with their environment at a speed dictated by the latter. Examples of such systems include web servers, network ...
Sanjit A. Seshia
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 4 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
PERCOM
2007
ACM
16 years 4 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins