Sciweavers

172 search results - page 24 / 35
» Secure and Manageable Virtual Private Networks for End-users
Sort
View
GCC
2004
Springer
15 years 5 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...

Publication
1298views
16 years 10 months ago
Quality of Service for Internet Traffic over ATM Service Categories
Connecting enterprise sites requires innovative architectures. Virtual private networks (VPNs) linking different organizational sites over the Internet are a popular solution. Inte...
Sonia Fahmy, Raj Jain, Sameh Rabie, Rohit Goyal, B...
ACSAC
2006
IEEE
15 years 5 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
DIM
2005
ACM
15 years 1 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
LCN
2006
IEEE
15 years 5 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...