Sciweavers

2024 search results - page 13 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
104
Voted
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 7 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
102
Voted
PERCOM
2005
ACM
16 years 1 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
SPW
2005
Springer
15 years 7 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
124
Voted
HICSS
2003
IEEE
95views Biometrics» more  HICSS 2003»
15 years 7 months ago
Matching Needs - Application Service Providing for Asynchronous Learning Networks
Universities have severe difficulties in using elearning applications successfully due to organizational problems to provide them. Providing a web-based learning environment is an...
Wolf-Gideon Bleek, Iver Jackewitz, Bernd Pape
NCA
2005
IEEE
15 years 7 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...