Sciweavers

347 search results - page 31 / 70
» On private computation in incomplete networks
Sort
View
ISN
1995
Springer
15 years 3 months ago
VPN on DCE: From Reference Configuration to Implementation
–This paper presents the results of the implementation of a Virtual Private Network telecommunications service prototype and associated management services on a distributed platf...
Jean-Paul Gaspoz, Constant Gbaguidi, Jens Meink&ou...
TRUST
2009
Springer
15 years 6 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
PAM
2012
Springer
13 years 7 months ago
Geolocating IP Addresses in Cellular Data Networks
Smartphones connected to cellular networks are increasingly being used to access Internet-based services. Using data collected from smartphones running a popular location-based app...
Sipat Triukose, Sebastien Ardon, Anirban Mahanti, ...
PERCOM
2007
ACM
15 years 11 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
DSOM
2004
Springer
15 years 5 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...