Sciweavers

6907 search results - page 947 / 1382
» Securing distributed adaptation
Sort
View
120
Voted
IICS
2010
Springer
15 years 7 months ago
Rearchitecting DNS
Abstract. The Domain Name System (DNS) has been the naming service of the Internet for more than 20 years. It is the foundation of virtually all other distributed service. The deï¬...
Gert Pfeifer, Christof Fetzer, Martin Steuer
GLOBECOM
2009
IEEE
15 years 7 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
132
Voted
AINA
2010
IEEE
15 years 7 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
127
Voted
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
15 years 7 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
ESWS
2006
Springer
15 years 7 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...